About dataComet/dataComet-Secure About dataComet-Secure, "The Secure Terminal Client Productivity Tool"... _______________________________________________________________ The dataComet-Secure application, resources, and on-line documentation are Copyright 2001-2016 databeast, Inc., All Rights Reserved. Reverse compilation or disassembly of dataComet-Secure is expressly forbidden. Unlicensed redistribution or export of this encryption software is also forbidden. See for information on purchasing dataComet-Secure. ______________________________________________________ dataComet-Secure is an AppleScriptable Macintosh OS X Telnet/SSH SOCKS application featuring PC-ANSI, VT220, & TN3270 terminal emulation, SCP, ZMODEM, and IND$FILE file transfer, multiple sessions, flexible and easy-to-use key remapping, edit windows, macro recording, and web browser support. Emulations supported include: * 16-color PC-ANSI and SCO-ANSI; * DEC VT52 (Heath-19), VT100, VT102, and VT220; * IBM Models 3278 and 3279 Color with extended attributes. Documentation on dataComet is available on-line in the "Help" menu. dataComet's on-line documentation makes detailed help available instantaneously: "Control-Click" on a menu, dialog item, or control to bring up the dataComet documentation describing the item; "Control-Command-Key" brings up the documentation for the menu command which the key triggers! Users can download a demo copy of dataComet-Secure from . dataComet-Secure incorporates strong encryption algorithms, and it may not be redistributed without a license. Please note that all use of dataComet-Secure requires that you accept the following license provisions: ___________________________________________________ dataComet-Secure License Provisions for Export Control: Beta versions of dataComet-Secure may not be exported from the United States. I understand that dataComet-Secure is subject to U.S. export controls on products incorporating strong encryption, and that I am not allowed to redistribute dataComet-Secure without a license. Redistribution of this software to unlicensed parties is forbidden, and may constitute a Federal felony. I understand that the requested software, dataComet-Secure, is subject to export controls under the Export Administration Act and that this software may only be transmitted, exported, or re exported under the laws, restrictions and regulations of the U.S. Bureau of Industry and Security (BIS) or foreign agencies or authorities. I affirm that I will comply with the restrictions above, and further affirm that I am not an agent for any entity subject to any legal restrictions on the export or use of encryption items from the U.S. In particular, I am not a national of Cuba, Iran, North Korea, Sudan, or Syria, nor am I listed by the BIS as a specially designated national or denied person. ___________________________________________________ Contacting databeast, Inc. ___________________________________________________ databeast, Inc. 1668 Trumansburg Rd. Ithaca, NY 14850-9213 607-277-5808 (9-3 PM EST) 607-277-5808 FAX ___________________________________________________ Credits ___________________________________________________ dataComet is derived from Comet, "The Cornell Macintosh Terminal Emulator," which was originally developed by Kevin Eric Saunders (a/k/a bonze blayk!), with contributions by John Lynn and Peter Hoyt, for Cornell Information Technologies under the general direction of Dick Cogger, Mark Oros, and Karen Fromkes (successively). Thanks are due to Simon Tatham for the PuTTY SSH source code and Tatu Ylonen for inventing and sharing the original implementation of SSH; to Doug Hornig for the basic TextEdit code; to Per Lindbergh for vttest; and to Erny Tontlinger for the excellent Terminal 2.2 code. My thanks go out likewise to MIT, Cornell, Brown, the University of Texas at Austin, NCSA, the National Science Foundation, and the American taxpayer for Kerberos and DES. My sincerest thanks also to the loyal Comet beta testers at Cornell; there are too many to list, but special thanks are due to Steve Worona, Bill Garrison, Karen Fromkes, Sanjay Hiranandani, Gail Honness, and Larry Chace ("May the sPam be with you!"). Happy Comet Trails! Annette Rose Blayk, President and COMETMONGER (F/K/A "Kevin Eric Saunders a/k/a bonze blayk!") "Felicity is everywhere... yet she's not a thing to be lightly grasped; For here you'd hold, not the name of a rose, but a fragile-thorny flower-asp..." -- bonze ___________________________________________________ dataComet Copyright Notices: DATABEAST, INC. MAKES NO REPRESENTATIONS OR WARRANTEES, EXPRESS OR IMPLIED. By way of example, but not limitation, DATABEAST, INC. MAKES NO REPRESENTATIONS OR WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THIS SOFTWARE OR DOCUMENTATION WILL NOT INFRINGE ANY PATENTS, COPYRIGHTS, TRADEMARKS, OR OTHER RIGHTS. Databeast, Inc. shall not be held liable for any liability with respect to any claim by the user or any other party arising from use of the program. ___________________________________________________ At least some portions of this program are derived from "Comet," The Cornell Macintosh Terminal Emulator, Copyright 1995 Cornell Research Foundation, Inc. (CRF) all rights reserved. Databeast, Inc. is a commercial licensee of CRF, and is required to cause these copyright and permission notices to appear on all copies and supporting documentation; the name of Cornell may not be used in advertising or publicity pertaining to distribution of the program without specific prior permission, notice must be given in supporting documentation that copying and distribution is only by licensed permission of CRF, and the provisions of M.I.T.'s notice, below, must be complied with. CRF MAKES NO REPRESENTATIONS OR WARRANTEES, EXPRESS OR IMPLIED. By way of example, but not limitation, CRF MAKES NO REPRESENTATIONS OR WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THIS SOFTWARE OR DOCUMENTATION WILL NOT INFRINGE ANY PATENTS, COPYRIGHTS, TRADEMARKS, OR OTHER RIGHTS. CRF shall not be held liable for any liability with respect to any claim by the user or any other party arising from use of the program. ___________________________________________________ Some portions of this code are derived from Simon Tatham's PuTTY Windows application: PuTTY is copyright 1997-2000 Simon Tatham. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL SIMON TATHAM BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. ___________________________________________________ Some portions of this code are derived from OpenSSH: Copyright (c) 2000 Markus Friedl, Theo de Raadt, Niels Provos, Dug Song, and Aaron Campbell. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ___________________________________________________ and some portions of the OpenSSH code distribution are derived from the original distribution of SSH: Copyright (c) 1995 Tatu Ylonen , Espoo, Finland, All rights reserved. As far as I am concerned, the code I have written for this software can be used freely for any purpose. Any derived versions of this software must be clearly marked as such, and if the derived work is incompatible with the protocol description in the RFC file, it must be called by a name other than "ssh" or "Secure Shell". ___________________________________________________ Some portions of this code are derived from M.I.T.'s PC-IP package: M.I.T notice: Permission to use, copy, modify, and distribute this program for any purpose and without fee is hereby granted, provided that this copyright and permission notice appear on all copies and supporting documentation, the name of M.I.T. not be used in advertising or publicity pertaining to distribution of the program without specific prior permission, and notice be given in supporting documentation that copying and distribution is by permission of M.I.T. M.I.T. makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty. ___________________________________________________ Some portions of this code are derived from the c3270 package: Modifications Copyright 1993, 1994, 1995, 1996, 1997, 1999, 2000 by Paul Mattes. Original X11 Port Copyright 1990 by Jeff Sparkes. Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. Copyright 1989 by Georgia Tech Research Corporation, Atlanta, GA 30332. All Rights Reserved. GTRC hereby grants public use of this software. Derivative works based on this software must incorporate this copyright notice. ___________________________________________________ Some portions of this code are derived from public Kerberos distributions: Copyright 1994 by OpenVision Technologies, Inc. Permission to use, copy, modify, distribute, and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appears in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of OpenVision not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. OpenVision makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty. OPENVISION DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL OPENVISION BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. ___________________________________________________ Copyright (c) 1991, 1993 The Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. 4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ___________________________________________________ Copyright (C) 1990 by the Massachusetts Institute of Technology Export of this software from the United States of America may require a specific license from the United States Government. It is the responsibility of any person or organization contemplating export to obtain such a license before exporting. WITHIN THAT CONSTRAINT, permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of M.I.T. not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. M.I.T. makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty. ___________________________________________________ Finally, this code relies upon Apple's implementation of the TCP IP protocol: APPLE COMPUTER, INC. ("APPLE") MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, REGARDING MACTCP. APPLE DOES NOT WARRANT, GUARANTEE OR MAKE ANY REPRESENTATIONS REGARDING THE USE OR THE RESULTS OF THE USE OF MACTCP IN TERMS OF ITS CORRECTNESS, ACCURACY, RELIABILITY, CURRENTNESS OR OTHERWISE. THE ENTIRE RISK AS TO THE RESULTS AND PERFORMANCE OF MACTCP IS ASSUMED BY YOU. THE EXCLUSION OF IMPLIED WARRANTEES IS NOT PERMITTED BY SOME STATES. THE ABOVE EXCLUSION MAY NOT APPLY TO YOU. IN NO EVENT WILL APPLE, ITS DIRECTORS, OFFICERS, EMPLOYEES OR AGENTS BE LIABLE TO YOU FOR ANY CONSEQUENTIAL, INCIDENTAL OR INDIRECT DAMAGES (INCLUDING DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, AND THE LIKE) ARISING OUT OF THE USE OR INABILITY TO USE MACTCP EVEN IF APPLE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. BECAUSE SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATIONS MAY NOT APPLY TO YOU. Apple's liability to you for actual damages for any cause whatsoever, and regardless of the form of the action (whether in contract, tort (including negligence), product liability or otherwise), will be limited to $50. ___________________________________________________