HP-UX Host Intrusion Detection System Release 4.0 Release Notes for HP-UX 11i v1 | HP-UX 11i v2

HP Software License
Attention
Appendix A 53
* attribution as the author of the parts of the library used.
* This can be in the form of a textual message at program star
tup or
* in documentation (online or textual) provided with the packa
ge.
*
* Redistribution and use in source and binary forms, with or w
ithout
* modification, are permitted provided that the following cond
itions
* are met:
* 1. Redistributions of source code must retain the copyright
* notice, this list of conditions and the following disclai
mer.
* 2. Redistributions in binary form must reproduce the above c
opyright
* notice, this list of conditions and the following disclai
mer in the
* documentation and/or other materials provided with the di
stribution.
* 3. All advertising materials mentioning features or use of t
his software
* must display the following acknowledgement:
* "This product includes cryptographic software written by
* Eric Young (eay@cryptsoft.com)"
* The word ’cryptographic’ can be left out if the routines
from the
library
* being used are not cryptographic related :-).
* 4. If you include any Windows specific code (or a derivative
thereof)
from
* the apps directory (application code) you must include an
* acknowledgement:
* "This product includes software written by Tim Hudson
* (tjh@cryptsoft.com)"
*
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ‘‘AS IS’’ AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITE
D TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PART
ICULAR,