GNU General Public License

administrators the tang dynasty 2015-10-14 three thousand six hundred and thirty-three

GNU General Public License [p=20, null, left] Third edition June 29, 2007 [/p][p=20, null, left] Copyright&# 169; 2007 Free Software Foundation, Inc. < http://fsf.org/ > [/p][p=20, null, left] Everyone is allowed to copy and distribute the complete version of this authorization document, but is not allowed to make any modifications to it [/p] introduction [p=20, null, left] The GNU General Public License is a free and public license document for software and other kinds of works. [/p][p=20, null, left] Most software licensing statements are designed to deprive you of the freedom to share and modify software. On the contrary, the GNU General Public License seeks to protect your freedom to share and modify free software - to ensure that software is free for all users. We, the Free Software Foundation, use the GNU General Public License for most of our software; This license also applies to any software distributed in this way by its author. You can also let your software use this license. [/p][p=20, null, left] When we talk about free software, we mean freedom of action, not free price. The GNU General Public License is designed to ensure that you have the freedom to release copies of free software (and charge for them, if you want), to ensure that you can receive source code or obtain source code when you need it, to ensure that you can modify the software or use part of it for new free software, and to ensure that you know that you can do these things. [/p][p=20, null, left] In order to protect your rights, we need to make a request to prohibit anyone from denying your rights or asking you to give up these rights. Therefore, if you release a copy of this software or modify it, you need to shoulder the responsibility of respecting the freedom of others. [/p][p=20, null, left] For example, if you distribute a copy of free software, whether in a free or paid mode, you must give the freedom you have obtained to the recipient of the copy as well. You must ensure that they also receive or get the source code. And you must show them these terms so that they know they have such rights. [/p][p=20, null, left] Developers using the GNU General Public License protect your rights through two measures: (1) declare the copyright of the software; (2) This license file is provided to you to give you the legal license to copy, distribute and/or modify the software. [/p][p=20, null, left] In order to protect software developers and authors, GPL explicitly states that free software does not have any warranty liability. As expected by users and software authors, GPL requires that the modified versions of software must be clearly identified, so as to avoid their problems being wrongly attributed to previous versions. [/p][p=20, null, left] Some devices are designed to refuse users to install or run modified versions of their internal software, although manufacturers can install and run them. This fundamentally violates the purpose of general public authorization to protect users' freedom to modify software. Such systematic mode of abusing this authorization appears in the most unacceptable field of individual user products. Therefore, we have designed this version of the General Public License to prohibit infringement of those products. If such problems occur in a large number in other fields, we are ready to extend this provision in the future general public license version to protect users' freedom. [/p][p=20, null, left] Finally, every program is often threatened by software patents. The government should not allow patent rights to restrict the development and use of general computer software, but in areas where the government does allow such things, we hope to avoid the danger of patent rights applied to free software effectively privatizing the software. In order to prevent this from happening, GPL ensures that no one can use the patent right to make free software non liberal. [/p][p=20, null, left] The following are the detailed terms and conditions for copying, distributing and modifying the software. [/p] Terms and Conditions 0. Definitions [p=20, null, left] "This License" refers to the third edition of GNU General Public License [/p][p=20, null, left] The term "copyright" also refers to the laws applicable to other products such as semiconductor masks to protect copyright. [/p][p=20, null, left] "This program" refers to any copyrighted work published under this license. The authorized person is called "you". "Licensee" and "copyright recipient" can be individuals or organizations. [/p][p=20, null, left] "Modification" refers to copying or making all or a little modification from the software, which is different from word for word copying and requires copyright permission. The modified result is called the "modified version" of the previous work or the software "based on" the previous work. [/p][p=20, null, left] "Overwrite program" refers to the program that has not been modified or based on the program. [/p][p=20, null, left] "Dissemination" of a program means using the program to do anything that would directly or indirectly infringe the copyright law if there was no license, not including executing the program on a computer or making modifications that you do not share with others. Communication includes reproduction, distribution (whether modified or not), sharing with the public, and other behaviors in some countries. [/p][p=20, null, left] "Publishing" a work means any act of dissemination that allows other organizations to make or accept copies. The act of communicating with a user only through the computer network without sending a copy of the program is not release. [/p][p=20, null, left] An interactive user interface displaying "appropriate legal notice" shall include such a convenient and obvious visual component, which has the following functions: (1) display an appropriate copyright notice; (2) Tell the user that there is no guarantee liability for this program (unless there is a guarantee expressly told), the authorized person can release this program under this authorization, and if you read the copy of this authorization agreement. If the interface displays a user command or option list, such as a menu, the options in the list must comply with the above specifications. [/p] 1. Source code [p=20, null, left] "Source code" refers to the form commonly used to modify the program. "Object code" means any non source code form of the program. [/p][p=20, null, left] "Standard interface" has two meanings: one is the official standard defined by the branch of the standard organization; The second is the interface that is widely used by developers of a certain language among the many interfaces defined specifically for that language. [/p][p=20, null, left] The "system library" of executable program does not refer to the whole program, but refers to any part included in the main component but not belonging to the component, and is developed only to enable the component, or to implement some standard interfaces of existing open source code. "Main parts" here refer to the main key parts (kernel, window system, etc.) of the specific operating system (if any) that executes the program, or the compiler used to generate the executable program, or the object code interpreter that runs the program. [/p][p=20, null, left] The "corresponding source code" of the program in the object code refers to all the source code needed to generate, install, (for executable programs) run the object code and modify the program, including the script that controls these behaviors. However, it does not include the system library required by the program, the tools for general purpose, and the generally available free software that is not included in the program and is used without modification when the program completes certain functions. For example, the corresponding source code includes the interface definition file related to the source file of the program, as well as the source code in the shared library and the dynamically linked subprogram required by the program design, such as frequent data interaction or control flow between these subprograms and other parts of the program. [/p][p=20, null, left] The corresponding source code does not need to contain any resources that can be automatically regenerated from other parts of these resources. [/p][p=20, null, left] The definition of source code corresponding to the program in the form of source code is the same as above. [/p] 2. Basic license [p=20, null, left] All rights granted under this license agreement are for the copyright of this program, and as long as the stated conditions are met, these licenses cannot be withdrawn. This authorization explicitly confirms that you can run the unmodified version of this program without any restrictions. The results obtained by running a program covered by this license can only be covered by this license when the content of the results constitutes an overlay program. This license recognizes your right to use it properly or other similar behaviors stipulated by copyright law. [/p][p=20, null, left] As long as your authorization is still valid, you can unconditionally create, run, and disseminate overlay programs that you do not publish. As long as you comply with the terms of this license on publishing materials that you do not have copyright, you can publish overlay programs to others to ask them to make special modifications for you or provide you with simple devices to run these programs. Those who make or run overlay programs for you, as your special representative, must also do so under your instructions and control. Please prohibit them from making copies of any programs you own copyright outside their relationship with you. [/p][p=20, null, left] When the following conditions are met, the release is allowed under any other circumstances. [/p][p=20, null, left] Sublicensing is not allowed. Section 10 makes it unnecessary. [/p] 3. Protect the legitimate rights of users from being infringed by anti cracking laws
Under any law that fulfills the tasks described in Chapter 11 of the WIPO Copyright Treaty adopted in 1996, or similar laws that prohibit or restrict this cracking method, the overlay program will not be recognized as part of an effective technical means.
When you release an overlay program, you will give up any legal force that prohibits cracking by technical means, and even the execution of the right under the terms of this license on the overlay program can complete the cracking. At the same time, you waive any attempt to restrict the user's operation or modify the overlay program to implement your legal rights to prohibit technical means from cracking.
4. Issue full copy [p=20, null, left] You can publish an unmodified complete copy of the source code of this program through any media, as long as you prominently and appropriately publish an appropriate copyright notice on each copy; Maintain a complete description of this License and any non licensed terms added in accordance with Section 7; Keep all disclaimers intact; A copy of this authorization shall be sent to all recipients along with the procedure. [/p][p=20, null, left] You can charge any price or free for your copy, or you can provide technical support or liability guarantee to charge. [/p] 5. Release the modified source code version [p=20, null, left] You can release a software based on this program in the form of source code under the terms of Section 4, or modify the software needed to make it from this program, as long as you meet all the following conditions at the same time: [/p][p=20, null, left] *A) The software produced must contain a clear notice stating that you have modified it and giving the corresponding modification date. [/p][p=20, null, left] *B) The software produced must contain a clear notice stating that it is released under this license and pointing out any conditions to be added in accordance with Section 7. This requirement modifies the requirement of "keeping all notices complete" in Section 4. [/p][p=20, null, left] *C) You must authorize the entire software as a whole to any person who obtains a copy in accordance with this License Agreement. This license will therefore, together with any terms added in accordance with Section 7, have legal effect on the entire software and all its parts, no matter what form they are packaged. This license does not allow you to license the software in any other form, but if you receive such a license individually, this license does not negate the license. [/p][p=20, null, left] *D) If your software contains interactive user interfaces, each user interface must display appropriate legal notices; However, if this program contains interactive interfaces that do not display the appropriate legal notices, it is not necessary for your software to modify them to display them. [/p][p=20, null, left] If a combination of an overlay program and other programs that are not extensions of the program itself is not intended to generate larger programs on a storage or distribution media, and the combination program and the corresponding copyright are not used to restrict the use of the program or restrict the legitimate rights of users of the combined program granted by a single program, Such a consortium is called "aggregate". Including an overlay program in an aggregate does not make this license apply to other parts of the aggregate. [/p] 6. Release copies in non source form [p=20, null, left] You can publish the program in the form of object code under the terms of sections 4 and 5, as long as you simultaneously publish the corresponding machine-readable source code under the terms of this license in one of the following ways: [/p][p=20, null, left] *A) Publish the object code in or as part of a physical product (including a physical release medium), and publish the corresponding source code in a durable physical medium commonly used for software exchange. [/p][p=20, null, left] *B) Release the object code in or as part of a physical product (including a physical release medium), and attach a written commitment with a validity of at least 3 years and the same length as the time you provide accessories or customer service for the product model. Give each person who owns the object code (1) either in a durable physical medium commonly used for software exchange, A copy of the corresponding source code of all the software covered by this license in the product at a price not higher than the reasonable cost you spend to execute the release of this source code; (2) You can either provide access to the corresponding source code through the network server for free. [/p][p=20, null, left] *C) Release a copy of the object code separately, and attach a written commitment to provide the corresponding source code. This kind of behavior is only allowed to happen occasionally and is not profitable, and when the object code you receive is accompanied with the commitment specified in section 6b. [/p][p=20, null, left] *D) Provide access to the published object code at the designated location (free or toll) and provide the same access to the corresponding source code at the same location without increasing the price. You do not need to ask the receiver to copy the corresponding source code together when copying the target code. If the location where the target code is copied is a network server, the corresponding source code can be on another server that supports the same copy function (operated by you or a third party), as long as you clearly indicate next to the target code where the corresponding source code can be found. No matter what kind of server provides the corresponding source code, you are obliged to ensure that it is available at any time of need, so as to meet this provision. [/p][p=20, null, left] *E) When publishing object code through point-to-point transmission, you need to tell other nodes where the object code and corresponding source code are provided to the public free of charge in accordance with the provisions of section 6 d. [/p][p=20, null, left] The separable part of the object code, whose source code is not included in the corresponding source code as a system library, does not need to be included in the behavior of releasing the object code. [/p][p=20, null, left] "User products" refer to (1) "consumer goods", that is, tangible personal property usually used for personal, family or daily purposes; Or (2) anything designed or sold for the company but sold to individuals. When judging whether a product is consumer goods, doubtful cases will be judged by the results that are conducive to coverage. For a specific product received by a specific user, "normal use" refers to the typical or common use of such product, regardless of the special circumstances of the user, or the actual use of the product by the user, or how the product is required to be used. Whether a product is a consumer product has nothing to do with whether the product has a substantial economic, industrial or non consumer use, unless the use is the only important use mode of such products. [/p][p=20, null, left] The "installation information" of the user product refers to any method, process, authorization key or other information required to install and run the modified version of the overlay program contained in the user product from the modified version of the corresponding source code. This information must be sufficient to ensure that the modified object code will not be unable to continue to run just because it has been modified. [/p][p=20, null, left] If you release the object code program in the user product, or along with it, or specifically for its use under the terms of this section, and the ownership and use right of the user product are transferred to the recipient permanently or within a certain period of time (regardless of the characteristics of this release) during the release process, The corresponding source code released under the terms described in this section must contain installation information. However, if you or any third party organization does not retain the ability to install the modified object code on the user's product (for example, the program is installed on the ROM), this requirement will not take effect. [/p][p=20, null, left] The requirement for providing installation information does not require the recipient to continue to provide support services, warranties or upgrades for the program that has been modified or installed, or for the user product that has modified or installed the program. When the modification itself actually affects the operation of the network on the contrary, or violates the rules and protocols of network communication, network access can be denied. [/p][p=20, null, left] The corresponding source code published according to this section and the installation information provided must be published in a public file format (and an implementation method of this type of document must be attached to share with the public in the form of source code). No password is required to decompress, read or copy these information. [/p] 7. Additional Terms [p=20, null, left] "Additional license" is to supplement the terms of this license by allowing some special cases of this license. As long as they are legal under the use law, the additional license that is effective for the entire program should be considered as the content of this license. If the additional license is only effective for a part of this program, this part can be used independently under those licenses, but the whole program is under the management of this license, regardless of the additional license. [/p] When you publish a copy of the overlay program, you can choose to delete any additional licenses for that copy or part of it. (When you modify a program, additional licenses may require that you remove yourself in some cases). You can put additional licenses on the materials and add them to the overlay programs that you own or can grant copyright licenses to.
Although this license is provided elsewhere, for the materials you add to the program, you can (if you are authorized by the copyright owner of the material) supplement this license with the following terms:
[p=20, null, left] a. Refuse to guarantee liability or limit liability in a manner different from the provisions of subsections 15 and 16 of this authorization; perhaps [/p][p=20, null, left] b. Request to retain a specific reasonable legal notice, or the contribution of the author of the program in the material or included in the appropriate legal notice; perhaps [/p][p=20, null, left] c. It is prohibited to misinterpret the source of the material, or require the modified version of the material to be marked as a different version from the original version in a reasonable way; Or v [/p][p=20, null, left] d. The name of the author or authorized person who is restricted from using the material for publicity purposes; perhaps [/p][p=20, null, left] e. Lower the level of authorization to use some trade names, trademarks or service marks under the trademark law; perhaps [/p][p=20, null, left] f. Any person who publishes the material (or its modified version) is required to protect the authorizer and the author of the material with a hypothetical contract of responsibility to the receiver, so as to avoid any such hypothetical contract directly causing the liability of the authorizer and the author. [/p][p=20, null, left] All other impermissible additional terms are considered "further binding" in Section 10. If you receive a program or part of it that claims to be managed by this authorization and adds further constraints, you can delete these constraints. If an authorization file contains further constraints, but allows re authorization or release under this authorization, as long as such further constraints cannot be retained in such re authorization or release, you can add materials under the terms of the authorization file in the overlay program. [/p][p=20, null, left] If you add terms to the overlay program according to this section, you must include a statement of additional terms applied to those files in the relevant source code file or a notice indicating where to find these terms. [/p][p=20, null, left] Additional terms, whether permissive or non permissive, can be written in a separate written authorization or declared as an exception; Both methods can meet the above requirements. [/p] 8. Termination of Authorization [p=20, null, left] You can propagate or modify the overlay program only under the explicit authorization of this license. Any other attempt to disseminate or modify the covered program is illegal and will automatically terminate your rights under this license (including any patent license granted pursuant to the third paragraph of Section 11). [/p][p=20, null, left] However, if you stop violating this license, the license you obtained from a specific copyright owner can be restored in the following ways: (a) You can temporarily own the license until the copyright owner explicitly terminates your license; (b) If the copyright owner does not inform you of the violation in some reasonable way within 60 days after you stop violating this license, you can obtain the license permanently. [/p][p=20, null, left] Further, if a copyright owner informs you of a violation of this license in some reasonable way, and this is the first time that you have received a notice of violation of this license from the copyright owner (for any software), and corrected the violation within 30 days after receiving the notice, then the license you obtained from the copyright owner will be permanently restored. [/p][p=20, null, left] When your authorization is terminated under the terms of this section, the authorization of those organizations that obtain authorization from you will not be terminated as long as they remain in compliance with this authorization agreement. You are only eligible to obtain a new license for this material under the terms of Section 10 after the license has been restored by the copyright owner. [/p] 9. You do not need to accept this authorization to obtain a copy [p=20, null, left] You do not need to accept this license agreement in order to receive or run a copy of this program. You are not required to accept this License Agreement only because of the propagation behavior caused by the point-to-point transmission of copies. However, except for this license, no license agreement can grant you the license to propagate or modify the overlay program. Therefore, if you modify or disseminate a copy of this program, you will accept this authorization by default. [/p] 10. Automatic authorization of downstream receivers [p=20, null, left] Each time you issue an overlay program, the recipient will automatically obtain an authorization from the original licensor to run, modify and disseminate the program in accordance with this license agreement. Under this authorization, you are not responsible for implementing the requirements of any third party organization. [/p][p=20, null, left] "Entity transaction" refers to the transaction that transfers the control or all assets of an organization, splits an organization, or consolidates an organization. If the spread of the overlay program is caused by an entity transaction, each organization receiving a copy of this program in this transaction will obtain a copy of any authorization that its predecessor owns or can provide in accordance with the preceding terms, as well as the right to obtain the source code corresponding to the program from its predecessor, if the predecessor owns or can obtain the source code with reasonable efforts. [/p][p=20, null, left] You may not impose any restrictions on the enforcement of the rights obtained or confirmed from this License Agreement. For example, you may not request licensing fees, royalty requirements or charge any fees for the implementation of the rights obtained from this license. You may not initiate litigation (including joint litigation and counterclaim) to claim that you have infringed any patent right due to the production, use, sale, wholesale or introduction of this program or any part of it. [/p] 11. Patents [p=20, null, left] "Contributor" is the copyright owner who grants the right to use this program or the program on which this program is based under this license. Such programs are called "contributor versions" of contributors. [/p][p=20, null, left] The "substantial patent declaration" of a contributor is all patents owned and controlled by the contributor, whether obtained or acquired in the future, which may be infringed in some way. This license allows the production, use and sale of the contributor's version, but does not include the declaration of patents that will be infringed only due to further modification of the contributor's version. For this reason, the term "control" includes the right to grant subordinate authorization in a manner consistent with the requirements of this authorization. [/p][p=20, null, left] Each contributor grants you a non exclusive, worldwide, royalty free patent license under the substantive patent declaration of the contributor, allowing you to make, use, sell, wholesale, import, run, modify and disseminate the content of its contributor version. [/p][p=20, null, left] In the following three paragraphs, "patent authorization" refers to an agreement or commitment expressed in any form not to enforce the patent right (such as an oral license to use the patent right, or a contract not to sue for patent infringement). Granting patent authorization to an organization means making such a commitment not to propose compulsory patent enforcement to the organization. [/p][p=20, null, left] If you release an overlay program based on a patent authorization with your own clear knowledge, and the corresponding source code of this program cannot provide free access to the public through the network server or other effective ways under the terms of this license, you must: (1) make the corresponding source code accessible according to the above methods; Or (2) waiving any benefit from the patent authorization of the program; Or (3) extend the patent license to downstream recipients in a way consistent with the requirements of this license. "When you clearly know that" means that you clearly know that in addition to obtaining patent authorization, your act of disseminating the covered program in a country, or the recipient's act of using the covered program, will infringe one or more identifiable patents in that country due to the patent authorization, and you have sufficient reason to believe that these patents are valid. [/p][p=20, null, left] In accordance with or in connection with a transaction or arrangement, if you obtain the transmission version of the published or disseminated overlay program and grant patent authorization to some organizations receiving the overlay program to allow them to use, disseminate, modify or publish a special version of the overlay program, Then the patent authorization you granted to these organizations will automatically extend to all recipients of the covered program and works based on the program. [/p][p=20, null, left] A patent license is "biased". If it does not cover its own scope, it is prohibited to exercise, or requires not to implement one or more rights expressly recognized under this license. Under the following circumstances, you cannot publish an overlay program: if you have an agreement with a third-party organization in the software publishing industry, and the agreement requires you to pay the organization according to the release of the program, and the organization grants any organization that has obtained the overlay software from you a biased patent license in your agreement, either (a) Together with copies you have issued (or copies made from those copies); Either (b) mainly for and together with a certain product or a consortium containing the covered program. If the date when you signed the agreement or obtained the patent authorization is earlier than March 28, 2007, you are not bound by these terms. [/p][p=20, null, left] No part of this license will be construed as rejecting or restricting any implied license or other measures to protect your patent from infringement under applicable patent law. [/p] 12. Don't give up others' freedom [p=20, null, left] If you encounter situations that contradict this authorization (whether court decisions, contracts or other situations), they cannot exempt you from the requirements of this authorization. If you cannot publish overlay programs in accordance with the obligations in this license and other related obligations at the same time, you will not be able to publish them. For example, if you accept the terms that require you to collect royalties from the person who owns or licenses the program, the only way you can meet both the license and those terms is not to publish the program at all. [/p] 13. Used together with GNU Affero general public license [p=20, null, left] Although there are other defensive clauses in this agreement, you have the right to link any overlay program with the program based on the third version of GNU Affero general public license, and release the joint program. The terms of this license are still valid for your coverage program, but the requirements of section 13 of the GNU Affero General Public License for interaction through the network will be valid for the entire consortium. [/p] 14. Amendments to this Authorization [p=20, null, left] The Free Software Foundation may sometimes issue revised and/or new versions of the GNU General Software License. Such a new version will be consistent with the current version in spirit, but may differ in details to deal with new problems and situations. [/p][p=20, null, left] Each version has a separate version number. If this program indicates a specific GNU general public license version number "and subsequent versions" applied to this program, you will have the right to choose the terms and conditions in this version or any subsequent version released by the Free Software Foundation. If this program does not specify a specific GNU general public license version number, you can choose any version released by the Free Software Foundation. [/p][p=20, null, left] If the program points out that an agent can decide whether the future GNU general public license can be applied to the program, then the public statement that the agent accepts any version is the permanent approval that you choose to apply this version to the program. [/p][p=20, null, left] Subsequent licensed versions may give you additional or different licenses. However, your choice of subsequent versions does not impose any obligation on any author or copyright owner. [/p] 15. Disclaimer [p=20, null, left] As permitted by applicable laws, this authorization does not assume any guarantee responsibility for this program. Unless stated in writing, the copyright owner and/or the third party organization providing this program will not assume any form of warranty liability "as usual", whether committed or implied, including but not limited to the default warranty liability for marketability and applicability for a particular purpose. All risks related to the quality and effectiveness of this procedure are borne by you. If this program is proven to be defective, you shall bear all necessary service, repair or correction costs. [/p] 16. Scope of liability [p=20, null, left] Unless required by applicable laws or agreed in writing, any copyright owner, or any person who modifies and/or publishes this program in the above way, will be liable for general, special, accidental or indirect losses caused by your use or inability to use this program, No liability (including but not limited to, loss of materials, inaccurate execution of materials, or losses that should be borne by you or a third person, or the inability of this program to operate with other programs, etc.), even if the copyright owner or other organizations have been informed of the possibility of such losses in the program. [/p] 17. Interpretation of Sections 15 and 16 [p=20, null, left] If the above disclaimer and scope of liability cannot be legally effective in accordance with local legal provisions, the review court should adopt the law closest to completely waiving civil liability for this procedure, unless the liability guarantee or liability assumption contract accompanying this procedure is charging. [/p]

If you ask many times but still cannot describe the problem correctly, you can purchase a remote+voice service-- QQ conversation
It charges 30 yuan each time to solve various small problems such as zblog error reason search, code search and code error search. (Although 95% of the problems can be found in the documents on the official website)
It can provide services such as charging customized plug-ins, special effects, emulating stations, code consulting, etc.
You can also enter groups to communicate with other small partners--- Click to join the group

return