<<이 문서를 인쇄하려면 굴림 10 글꼴을 사용해 주십시오.>> Trend Micro, Inc. 09.07.28 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Trend Micro(TM) Internet Security 2010 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 참고: 이 추가 정보 파일은 상기 일자 당시의 최신 정보입니다. 다음의 Trend Micro 웹 사이트에서 업데이트된 내용을 확인할 수 있습니다. http://www.trendmicro.com/download/kr/ 목차 ===================================================================== 1. Trend Micro(TM) Internet Security 17.50 정보 2. 새로운 기능 3. 문서 자료 4. 시스템 요구 사항 4.1 호환 가능한 Microsoft 운영 체제 4.2 CPU 4.3 메모리, 디스크 공간 및 모니터 4.4 웹 브라우저 4.5 메일 검색용 전자 메일 소프트웨어 4.6 메일 검색용 웹 기반 메일 서비스 4.7 Trend Micro 스팸 방지 도구 모음용 전자 메일 소프트웨어 4.8 데이터 절도 방지용 인스턴트 메시징 소프트웨어 4.9 실시간 보호용 인스턴트 메시징 소프트웨어 4.10 인터넷 연결 4.11 호환되지 않는 소프트웨어 5. 설치 5.1 설치 고려 사항 5.2 설치 단계 6. 설치 후 구성 7. 알려진 문제 8. 연락처 정보 9. Trend Micro 정보 10. 사용권 계약 11. 라이센스 속성 ===================================================================== 1. Trend Micro(TM) Internet Security 17.50 정보 ======================================================================== Trend Micro(TM) Internet Security 17.50는 바이러스, 트로이 목마 프로 그램, 웜 및 네트워크 바이러스와 루트키트를 포함한 기타 위협으로부터 보호하는 포괄적인 기능을 제공하며, 스파이웨어, 해커, 피싱 사기 시도 및 원치 않는 웹 사이트도 차단합니다. 또한 스팸 전자 메일 메시지도 필터링할 수 있습니다. Trend Micro Internet Security 17.50의 향상된 기능으로 사용자 컴퓨터와 인터넷 연결을 보호할 수 있습니다. 2. 새로운 기능 ======================================================================== 이 버전의 Trend Micro Internet Security는 다음과 같은 새 기능을 포함 합니다. a. 이 버전에서는 Microsoft Windows 7을 완벽하게 지원합니다. b. 새로운 보안 기능은 USB 드라이브의 의심스러운 소프트웨어가 열리지 않도록 자동으로 방지할 수 있습니다. c. 이 버전은 Trend Micro 스마트 보호 네트워크와 위협 정보를 공유할 수 있습니다. 이 네트워크는 수백만 대의 컴퓨터에서 발견된 위협에 대한 정보를 자동으로 상호 관련시켜 사용자를 보다 효과적으로 보호해 줍니 다. d. 이 버전은 현재 의심스러운 도메인 이름을 기반으로 잠재적으로 안전하 지 않은 웹 사이트를 열려는 시도를 차단할 수 있습니다. 3. 문서 자료 ======================================================================== a. 이 README.txt 파일에는 기본 설치와 구성 지침, 알려진 문제점 목록 및 연락처 정보가 들어 있습니다. b. 제품 도움말에서는 Trend Micro Internet Security의 모든 기능에 대해 설명하고 수행 중인 작업을 안내합니다. c. 기술 자료 -- 특정 문제 해결과 문제 해결 항목을 비롯하여 알려진 제품 문제를 검색할 수 있는 데이터베이스입니다. http://esupport.trendmicro.com 참고: 인쇄된 설명서의 파일 버전은 다음 위치에 있습니다. http://www.trendmicro.com/download/kr/ 4. 시스템 요구 사항 ======================================================================== Trend Micro Internet Security을 실행하려면 사용자 컴퓨터가 다음 하드 웨어 및 소프트웨어 사양을 만족해야 합니다. 4.1 호환 가능한 Microsoft 운영 체제 ===================================================================== a. Windows 7 Ultimate, Professional, HomePremium, Home Basic 또 는 Starter Kit(32비트 또는 64비트) b. SP1(서비스 팩 1) 또는 SP2(서비스 팩 2)가 포함되거나 포함되지 않은 Windows Vista Ultimate, Business, HomePremium 또는 Home Basic(32비트 또는 64비트) c. SP2(서비스 팩 2) 또는 SP3(서비스 팩 3)이 포함된 Windows XP Home, Professional, Media Center, Tablet PC Edition (32비트) 4.2 CPU ===================================================================== a. Windows 7 Ultimate, Professional, HomePremium, Home Basic 또 는 Starter Kit(32비트 또는 64비트) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Intel Pentium 800MHz(1GHz 권장) b. Windows Vista Home Basic, Home Premium, Business 또는 Ultimate(32비트 또는 64비트) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Intel Pentium 800MHz(1GHz 권장) c. Windows XP Home, Professional, Media Center 또는 Tablet PC ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Intel Pentium 350MHz (800MHz 권장) 참고: Trend Micro Internet Security 17.50은 하이퍼 스레딩 및 듀 얼 코어 또는 쿼드 코어 Atom 프로세서 및 위에 나열된 프로세 서와 동급의 프로세서가 탑재된 컴퓨터를 지원합니다. 4.3 메모리, 디스크 공간 및 모니터 ===================================================================== a. 메모리 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Windows XP의 경우 최소 256MB(512MB 권장) Windows Vista/Windows 7의 경우 최소 512MB(1GB 권장) b. 디스크 공간 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 500MB 설치 공간 참고: Trend Micro Internet Security 17.50은 RAID 0(스트라이핑) 또는 RAID 1(미러링)을 지원할 수 있습니다. c. 모니터 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 최소 1024 x 576의 하이 컬러 4.4 웹 브라우저 ===================================================================== Trend Micro Internet Security가 설치된 컴퓨터에 이러한 웹 브라우저 중 하나를 설치하는 것이 좋습니다: Microsoft Internet Explorer 6.0 서비스 팩 2(SP2)* Microsoft Internet Explorer 7.0 Microsoft Internet Explorer 8.0 * Microsoft Windows XP만 해당 4.5 메일 검색용 전자 메일 소프트웨어 ===================================================================== Microsoft Outlook Express 6.0 서비스 팩(SP2) Microsoft Outlook 2000, 2002, 2003 또는 2007 Mozilla Thunderbird 1.5 또는 2.0 Windows Mail(Microsoft Windows Vista 또는 Windows 7) Windows Live Mail 4.6 메일 검색용 웹 기반 메일 서비스 ===================================================================== Yahoo! Mail MSN Hotmail / Windows Live Mail AOL Mail 4.7 Trend Micro 스팸 방지 도구 모음용 전자 메일 소프트웨어 ===================================================================== a. Microsoft Windows XP의 경우 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Microsoft Outlook Express 6.0 서비스 팩(SP2) Microsoft Outlook 2000, 2002, 2003 또는 2007 b. Microsoft Windows Vista 또는 Windows 7의 경우 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Microsoft Outlook 2003 또는 2007 Windows Mail 4.8 데이터 절도 방지용 인스턴트 메시징 소프트웨어 ===================================================================== AOL Instant Messenger 5.9 ICQ 5.1, 6.0, 6.5 또는 ICQ Lite Windows Live Messenger 8.0, 8.5, 9.0 Yahoo! Messenger 7.0, 8.0, 8.1 4.9 실시간 보호용 인스턴트 메시징 소프트웨어 ===================================================================== Windows Live Messenger 8.0 Windows Live Messenger 8.5 Windows Live Messenger 9.0 4.10 인터넷 연결 ===================================================================== Trend Micro Internet Security는 온라인 정품 인증, 만료 날짜 확인, 업데이트 다운로드, 유해 소프트웨어에 대한 피드백 전송, Trend Micro 스팸 방지 도구 모음 쿼리 전송, Trend Micro 데이터 네트워크 및 스마트 보호 네트워크 정보 전송, 바이러스 정보 습득 또는 Trend Micro 웹 사이트 페이지 검색을 위해 인터넷 연결이 필요합니 다. 연결 시간 또는 데이터 다운로드 양에 따라 연결 시 요금이 부과되는 전화 접속이나 기타 인터넷 연결을 사용하는 경우, 위에 나열된 기능 을 지원하기 위한 라우터 또는 연결 소프트웨어 자동 연결로 인해 추 가 연결 요금이 발생하지 않도록 하십시오. 필요한 경우 라우터 지침 에 따라 라우터 설정을 편집하십시오. 4.11 호환되지 않는 소프트웨어 ===================================================================== Trend Micro Internet Security를 컴퓨터에 설치하기 전에 먼저 제거 해야 하는 소프트웨어는 다음 웹 사이트를 참조하십시오. http://esupport.trendmicro.com/support/consumer/search.do? cmd=displayKC&docType=kc&externalId=PUB-en-1037925 5. 설치 ======================================================================== Trend Micro Internet Security 설치는 몇 분 정도 걸립니다. 5.1 설치 고려 사항 ===================================================================== Trend Micro Internet Security를 설치하기 전에 다음 요구 사항을 살 펴 보십시오. a. 최신 버전의 Trend Micro Internet Security를 설치하기 전에 바이 러스 또는 스파이웨어로부터 컴퓨터를 보호하는 프로그램을 모두 제거하십시오. 그렇지 않은 경우 Trend Micro Internet Security를 설치하는 도중 해당 프로그램이 제거됩니다. b. 이 Trend Micro Internet Security 버전은 Trend Micro Internet Security 2009 또는 2008에서 업그레이드할 수 있습니다. 5.2 설치 단계 ===================================================================== Trend Micro Internet Security를 설치하려면 다음을 수행하십시오. a. 설치 프로그램을 시작합니다. b. 사용권 계약에 동의합니다. c. 일련 번호를 입력합니다. d. 설치 옵션을 선택하고 "다음" 단추를 클릭합니다. e."다음"를 클릭하여 프로그램을 정품 인증합니다. f. 암호, 사용자 이름, 전자 메일 주소 및 현재 위치를 입력합니다. g. 입력한 정보가 정확한지 확인합니다. h. "마침"를 클릭하여 창을 닫고 기본 콘솔을 시작합니다. 참고: 인터넷에 연결되어 있지 않으면 e, f, g단계를 완료할 수 없습 니다. 필요한 경우 인터넷에 다시 연결한 후에 기본 콘솔에서 소프트웨어를 활성화하십시오. 6. 설치 후 구성 ======================================================================== Trend Micro Internet Security가 최신 보호 기능을 제공하는지 확인하려 면 다음 작업을 완료합니다. a. Trend Micro Internet Security의 기본 콘솔을 엽니다. b. "지금 업데이트" 단추를 클릭한 다음 "지금 검색" 단추를 클릭합니다. 7. 알려진 문제 ======================================================================== 이번 릴리스에는 다음과 같은 알려진 문제가 있습니다. a. 데이터 절도 방지를 사용하도록 설정하거나 사용하지 않도록 설정하면 Yahoo! Messenger 9.0을 사용할 때 CPU 사용률이 크게 높아질 수 있습 니다. b. Windows AERO 모드가 실행되는 컴퓨터에서 시스템 글꼴 크기를 150% DPI로 설정하면 인터페이스가 제대로 표시되지 않을 수 있습니다. c. Microsoft Windows 7이 실행되는 컴퓨터에서 제어판의 프로그램 제거 창에 올바른 디스크 크기가 표시되지 않습니다. d. AOL Instant Messenger 6 이상 버전을 사용할 경우 데이터 절도 방지 기능이 제대로 작동하지 않습니다. 8. 연락처 정보 ======================================================================== Trend Micro 소프트웨어에 대한 라이센스에는 일반적으로 제품 업데이트, 패턴 파일 업데이트 및 구매 날짜로부터 1년 동안의 기본 기술 지원이 포함됩니다. 1년이 지난 뒤에는 Trend Micro의 해당 시점 유지 관리 비용에 따라 연간 단위로 유지 관리를 갱신해야 합니다. 팩스, 전화, 전자 메일을 사용하거나 다음 주소를 통해 Trend Micro에 연락할 수 있습니다. http://www.trendmicro.co.kr/kr/home/ Trend Micro 제품의 평가판을 웹 사이트에서 다운로드할 수 있습니다. 전 세계 전자 메일 주소/전화 번호 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 아시아/태평양 지역, 호주 및 뉴질랜드, 유럽, 남미 및 캐나다 등 전 세계 연락처 정보는 다음 사이트에 있습니다. http://www.trendmicro.com/kr/about/overview.htm Trend Micro "About Us" 화면이 표시됩니다. 화면의 "Contact Us" 섹션에서 해당하는 링크를 클릭합니다. 참고: 이 정보는 통보 없이 변경될 수 있습니다. 9. Trend Micro 정보 ======================================================================== Trend Micro, Inc.는 바이러스 백신, 스팸 차단 및 콘텐츠 필터링 보안 제품과 서비스를 제공합니다. Trend Micro를 통해 전세계 기업들은 중앙 지점에서 바이러스와 악성 코드가 데스크톱에 도달하기 전에 이를 차단할 수 있습니다. Copyright 2009, Trend Micro Incorporated. All rights reserved. Trend Micro, Trend Micro Internet Security, TrendSecure, t-자 로고 및 PC-cillin은 Trend Micro Incorporated의 상표이며 일부 지역에서는 등록 상표입니다. 기타 모든 상표는 해당 소유 회사의 상표이거나 등록 상표입 니다. 10. 사용권 계약 ======================================================================== Trend Micro와의 사용권 계약에 대한 정보는 다음 주소에서 볼 수 있습니다. http://www.trendmicro.com/en/purchase/license/ 타사 라이센스: 11. License Attributions ======================================================================== This product includes or may include the following: OpenSSL License Agreement ==================================================================== Copyright (c) 1998-2003 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)" 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org. 5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project. 6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)" THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' WITHOUT ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 7zip License Agreement ==================================================================== GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called "this License"). Each licensee is addressed as "you". A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables. The "Library", below, refers to any such software library or work which has been distributed under these terms. A "work based on the Library" means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term "modification".) "Source code" for a work means the preferred form of the work for making modifications to it. For a library, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the library. Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a work based on the Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does. 1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with the Library. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) The modified work must itself be a software library. b) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change. c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License. d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful. (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library. In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not make any other change in these notices. Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy. This option is useful when you wish to copy part of the code of the Library into a program that is not a library. 4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange. If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code. 5. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a "work that uses the Library". Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License. However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a "work that uses the library". The executable is therefore covered by this License. Section 6 states terms for distribution of such executables. When a "work that uses the Library" uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law. If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative work. (Executables containing this object code plus portions of the Library will still fall under Section 6.) Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself. 6. As an exception to the Sections above, you may also combine or link a "work that uses the Library" with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications. You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License. You must supply a copy of this License. If the work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License. Also, you must do one of these things: a) Accompany the work with the complete corresponding machine- readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable "work that uses the Library", as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions.) b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user's computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with. c) Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution. d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place. e) Verify that the user has already received a copy of these materials or that you have already sent this user a copy. For an executable, the required form of the "work that uses the Library" must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you distribute. 7. You may place library facilities that are a work based on the Library side-by-side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things: a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above. b) Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work. 8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 9. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it. 10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties with this License. 11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Library at all. For example, if a patent license would not permit royalty-free redistribution of the Library by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/ donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Library specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation. 14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. NOTE: Trend Micro made modifications to the following source codes on the corresponding dates: 7zip - May 15, 2008 For three (3) years from date you first use this source code, Trend Micro hereby offers to you a complete machine readable copy of the above referenced modified source code subject to the terms and condition of the GNU Lesser Public License. Zlib License Agreement ==================================================================== License /* zlib.h -- interface of the 'zlib' general purpose compression library version 1.2.2, October 3rd, 2004 Copyright (C) 1995-2004 Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. Jean-loup Gailly jloup@gzip.org Mark Adler madler@alumni.caltech.edu Perl Compatible Regular Expressions License Agreement ==================================================================== PCRE LICENCE ------------ PCRE is a library of functions to support regular expressions whose syntax and semantics are as close as possible to those of the Perl 5 language. Release 7 of PCRE is distributed under the terms of the "BSD" licence, as specified below. The documentation for PCRE, supplied in the "doc" directory, is distributed under the same terms as the software itself. The basic library functions are written in C and are freestanding. Also included in the distribution is a set of C++ wrapper functions. THE BASIC LIBRARY FUNCTIONS --------------------------- Written by: Philip Hazel Email local part: ph10 Email domain: cam.ac.uk University of Cambridge Computing Service, Cambridge, England. Copyright (c) 1997-2008 University of Cambridge All rights reserved. THE C++ WRAPPER FUNCTIONS ------------------------- Contributed by: Google Inc. Copyright (c) 2007-2008, Google Inc. All rights reserved. THE "BSD" LICENCE ----------------- Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of the University of Cambridge nor the name of Google Inc. nor the names of their contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. End Compress-Zlib License Agreement ==================================================================== The "Artistic License" Preamble The intent of this document is to state the conditions under which a Package may be copied, such that the Copyright Holder maintains some semblance of artistic control over the development of the package, while giving the users of the package the right to use and distribute the Package in a more-or-less customary fashion, plus the right to make reasonable modifications. Definitions: "Package" refers to the collection of files distributed by the Copyright Holder, and derivatives of that collection of files created through textual modification. "Standard Version" refers to such a Package if it has not been modified, or has been modified in accordance with the wishes of the Copyright Holder as specified below. "Copyright Holder" is whoever is named in the copyright or copyrights for the package. "You" is you, if you're thinking about copying or distributing this Package. "Reasonable copying fee" is whatever you can justify on the basis of media cost, duplication charges, time of people involved, and so on. (You will not be required to justify it to the Copyright Holder, but only to the computing community at large as a market that must bear the fee.) "Freely Available" means that no fee is charged for the item itself, though there may be fees involved in handling the item. It also means that recipients of the item may redistribute it under the same conditions they received it. 1. You may make and give away verbatim copies of the source form of the Standard Version of this Package without restriction, provided that you duplicate all of the original copyright notices and associated disclaimers. 2. You may apply bug fixes, portability fixes and other modifications derived from the Public Domain or from the Copyright Holder. A Package modified in such a way shall still be considered the Standard Version. 3. You may otherwise modify your copy of this Package in any way, provided that you insert a prominent notice in each changed file stating how and when you changed that file, and provided that you do at least ONE of the following: a) place your modifications in the Public Domain or otherwise make them Freely Available, such as by posting said modifications to Usenet or an equivalent medium, or placing the modifications on a major archive site such as uunet.uu.net, or by allowing the Copyright Holder to include your modifications in the Standard Version of the Package. b) use the modified Package only within your corporation or organization. c) rename any non-standard executables so the names do not conflict with standard executables, which must also be provided, and provide a separate manual page for each non-standard executable that clearly documents how it differs from the Standard Version. d) make other distribution arrangements with the Copyright Holder. 4. You may distribute the programs of this Package in object code or executable form, provided that you do at least ONE of the following: a) distribute a Standard Version of the executables and library files, together with instructions (in the manual page or equivalent) on where to get the Standard Version. b) accompany the distribution with the machine-readable source of the Package with your modifications. c) give non-standard executables non-standard names, and clearly document the differences in manual pages (or equivalent), together with instructions on where to get the Standard Version. d) make other distribution arrangements with the Copyright Holder. 5. You may charge a reasonable copying fee for any distribution of this Package. You may charge any fee you choose for support of this Package. You may not charge a fee for this Package itself. However, you may distribute this Package in aggregate with other (possibly commercial) programs as part of a larger (possibly commercial) software distribution provided that you do not advertise this Package as a product of your own. You may embed this Package's interpreter within an executable of yours (by linking); this shall be construed as a mere form of aggregation, provided that the complete Standard Version of the interpreter is so embedded. 6. The scripts and library files supplied as input to or produced as output from the programs of this Package do not automatically fall under the copyright of this Package, but belong to whoever generated them, and may be sold commercially, and may be aggregated with this Package. If such scripts or library files are aggregated with this Package via the so-called "undump" or "unexec" methods of producing a binary executable image, then distribution of such an image shall neither be construed as a distribution of this Package nor shall it fall under the restrictions of Paragraphs 3 and 4, provided that you do not represent such an executable image as a Standard Version of this Package. 7. C subroutines (or comparably compiled subroutines in other languages) supplied by you and linked into this Package in order to emulate subroutines and variables of the language defined by this Package shall not be considered part of this Package, but are the equivalent of input as in Paragraph 6, provided these subroutines do not change the language in any way that would cause it to fail the regression tests for the language. 8. Aggregation of this Package with a commercial distribution is always permitted provided that the use of this Package is embedded; that is, when no overt attempt is made to make this Package's interfaces visible to the end user of the commercial distribution. Such use shall not be construed as a distribution of this Package. 9. The name of the Copyright Holder may not be used to endorse or promote products derived from this software without specific prior written permission. 10. THIS PACKAGE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. 끝