Cerberus FTP Server

Total Page:16

File Type:pdf, Size:1020Kb

Cerberus FTP Server V.11 Cerberus, LLC Cerberus ​FTP Server User Manual Detailed steps and help on configuring Cerberus FTP Server. CONTENTS 1.0 Introduction 14 1.1 Description 14 1.2 Guide 14 2.0 Minimum System Requirements 15 2.1 Hardware Requirements 15 2.2 Operating Systems 15 2.2.1 Cerberus FTP Server 10.0 15 3.0 Installation 16 4.0 Upgrading an Existing Installation 19 4.1 Method 1: Using the Auto-updater 19 4.2 Method 2: Manually downloading and running the latest Installer 20 5.0 Getting Started - Initial Setup Wizard 21 5.1 The Wizard 21 5.1.1 Step 1 - Licensing 21 5.1.2 Step 2 - Initial User Creation 22 5.1.3 Step 3 - Network Setup 23 5.1.3.1 Public IP Auto-detection for Passive Mode FTP 23 5.1.4 Step 4 – Security 24 5.1.4.1 Web Administration Password 25 5.1.5.2 Protocol Security 25 5.1.5.3 Final Steps 25 6.0 Getting Started - Network Setup 26 6.1 Basic Setup so users can connect from the Internet 26 6.1.1. Step 1 - Control Connection 26 6.1.2 Step 2 - Passive Mode 26 6.1.3 Step 3 - Firewall 26 7.0 How many types of FTP are there? 27 7.1 Controlling what types of FTP are Allowed 27 7.1.1 Restricting FTP connections at the User level 27 7.1.2 Restricting FTP connections at the Listener level 28 8.0 SSH2 SFTP Setup 29 8.1 About SSH SFTP Support in Cerberus FTP Server 29 8.2 Supported SSH2 Key Exchange Methods 29 8.3 Supported SSH2 Ciphers 29 8.4 Supported SSH2 MAC Algorithms 30 8.5 Adding an SSH2 SFTP Listener 30 8.6 Allowing SSH2 SFTP Connections through a Firewall 30 8.7 Enabling or Disabling Existing SFTP Listeners 30 9.0 Configuring the Server 31 9.1 Allowing External Access to your Server 31 9.1.1 The control connection 31 9.1.2 The data connection 31 9.2 Common Network Configurations 32 9.2.1 Configuration 1: Your computer is connected directly to the Internet 32 9.2.2 Configuration 2: Your computer is connected to a router, and the router is connected to the Internet 32 10.0 The Summary View 34 10.1 Understanding the Summary View 34 10.2 Common System Messages 34 10.2.1 “FTP Listener X can allow unencrypted control or data connections” 35 10.2.2 “HTTP Listener X only accepts unencrypted connections” 35 10.2.3 “HIPAA Non-compliance: One or more listeners allows non-encrypted traffic” 35 10.2.4 “FXP is enabled and could leave the server vulnerable to an FTP bounce attack” 36 10.2.5 “Server is configured to allow FTP data connection to reserved ports” 36 10.2.6 “You should set a Remote Access password” 36 11.0 The User Manager 37 11.1 About Cerberus FTP Server Authentication 37 11.2 Adding a new user 37 11.3 Configuring a user for SSH Public Key Authentication 40 11.4 The Virtual Directory System 41 11.5 Simple Virtual Directory mode 41 11.6 Standard Virtual Directory mode 41 11.6.1 A Virtual Directory Mode Example 41 11.6.2 Variables that can appear in Virtual Directory Names and Paths 42 11.7 Adding a virtual directory to a user account 42 11.8 Virtual Directory Permissions 43 12.0 Cerberus Group Accounts 44 12.1 About Groups 44 12.2 Overriding Group settings for a User 45 12.3 Adding a new group 45 13.0 User Policy Settings 47 13.1 Password Complexity Requirements 47 13.2 Password Change Policy 48 13.3 Password History 49 13.4 Authentication Order 49 13.5 Authentication Requirements 50 14.0 General Settings 52 14.1 Configuring General Settings 52 14.2 General 53 14.3 Network 53 14.4 Notification 54 15.0 Protocol Settings 55 15.1 FTP/S Settings 56 15.1.1 PASV Port Range 56 15.1.2 Advanced FTP/S Settings 56 15.1.2.1 FTP Directory Listing Time Format 56 15.1.2.2 FTP MDTM Time Format 56 15.1.2.3 FTP Compression 57 15.1.2.4 FTP Miscellaneous 57 15.2 SSH SFTP Settings 58 15.3 Advanced SSH Settings 58 15.4 HTTP/S Settings 58 16.0 Configuring Logging Support 60 16.1 Auditing 60 16.2 Log File Location 60 16.2.1 On Windows Vista, Windows 2008 and above 60 16.2.2 On Windows 2003, XP, and 2000 60 16.3 Configuring Logging 60 16.3.1 Example Syslog log4j.xml Configuration File 62 16.3.2 Example Daily Rollover log4j.xml Configuration File 62 16.3.3 Log File Location and Naming 63 16.4 Screen Logging Settings 63 16.4.1 Root Log Level 63 16.4.2 Syslog Support 65 17.0 Interface Settings 66 17.1 Configuring Interface Settings 66 17.2 Types of Listeners 67 17.3 Adding a New Interface Listener 67 17.4 Interface Settings 68 17.5 The "Default" Interfaces 70 17.6 Interface Status Controls 70 17.7 The HTTP/S Web Client 71 17.8 Security 71 17.8.1 Additional Web Client features include: 71 17.9 Public File Sharing 72 17.10 Emailing a link to a Public File 72 17.12 Adding an HTTP/S Listener 73 17.13 Web Client Customizations 74 17.13.1 Changing the Company Logo and Login Image 74 17.13.2 Changing the Login Welcome Message 75 17.13.3 Custom Web Client Themes 75 17.13.4 Further Web Client Customizations 75 18.0 Web Account Requests 76 18.1 Allowing Users to Request Accounts through the Web 76 18.1.1 Requesting a New Account 76 18.1.2 Enabling or Disabling Account Requests 77 18.2 Approving or Denying Account Requests 77 19.0 Security Settings 79 19.1 Configuring Security Settings 79 19.1.1 Digital Certificate Support 79 19.1.2 About Certificate Authorities 79 19.3 TLS/SSL Security 80 19.3.1 General 80 19.3.2 Advanced TLS Options 82 19.3.3 DUO 2FA 83 Setting up DUO in Cerberus 84 19.3.4 Client Verification 85 19.5 DSA Certificates and Ephemeral Diffie-Hellman Keys 86 19.6 Elliptic Curve SSH Support 86 20.0 Remote Settings 87 20.1 Configuring Remote Settings 87 20.1.1 General SOAP Settings 88 20.1.2 SOAP TLS Settings 89 20.1.3 Administrator Accounts 89 20.1.4 Secondary Web Administration Accounts 90 21.0 Setting up a Database for Statistics 91 21.1 Installing Microsoft SQL Server 2012 LocalDB 92 21.1.1 For the 64-bit version of Cerberus FTP Server: 92 21.1.2 For the 32-bit version of Cerberus FTP Server: 92 21.2 Selecting a Database 92 21.3 Database Backup and Restore 93 22.0 Advanced Settings 94 22.1 Configuring Advanced Settings 94 22.1.1 Send and Receive Buffers 94 22.1.2 Interface Advanced Settings 95 22.1.3 Advanced Windows Settings 95 23.0 The IP Manager 96 23.1 General Settings 96 23.1.1 Adding a single IP address to the IP manager policy 97 23.1.2 Adding a range of IP addresses to the IP manager policy 97 23.1.2.1 CIDR Support 97 23.1.3 Deleting an IP addresses from the current policy 97 23.1.4 Searching for an IP Address 97 23.2 The "Auto-Blocking" page 97 23.2.1 Immediately Ban these Users 99 23.2.2 Differences in Auto-blocking between Allow and Deny mode 99 24.0 The Event Manager 100 24.1 About Event Rules 100 24.2 The Event Targets page 100 24.2.1 Available Target Types 101 24.2.1.1 SMTP Server Targets 101 24.2.1.2 Executable Targets 101 24.2.1.3 HTTP Post Targets 102 24.2.2 Adding a New Event Target 102 24.2.3 Modifying an existing event target. 102 24.3 The Rules page 102 24.4 Editing a Rule 102 24.4.1 Available Event Rule Types 103 24.4.2 Adding a New Rule or Editing an Existing Rule 105 24.4.2.1 To add a new rule: 105 24.4.2.2 To edit an existing rule: 105 24.4.3 Changing the Name of a Rule 105 24.5 Adding Rule Conditions 105 24.5.1 Rule Matching Modes 105 24.5.2 Rule Variables 106 24.5.2 Comparison Operations 106 24.5.3 Deleting an Event Condition 106 24.6 Rule Actions 106 24.6.1 Adding Rule Actions 107 24.6.2 To add a new Action to a Rule: 107 24.6.3 Editing an Existing Rule Action 108 24.6.4 Deleting an Existing Rule Action 108 24.6.5 Changing the order an action is executed 108 24.6.6 Creating a Failure Action 108 24.6.6.1 Removing a failure action 109 24.7 Event Tasks 109 24.8 Adding a schedule to an Event Task 109 25.0 Adding and editing Event Task Actions 110 26.0 Folder Monitors 110 26.1 Other Event Settings 110 27.0 The Report Manager 111 27.1 Generating a Report 112 27.1.1 File Access Reports 113 28.0 Localization 114 29.0 LDAP Authentication 115 28.1 Default Virtual Directory Mapping for LDAP Users 117 29.1 Setting up Active Directory Authentication using LDAP 119 29.2 LDAP User to Cerberus Group Mapping 121 29.2.1 Creating an LDAP User to Cerberus Group Mapping 121 29.2.2 Removing an LDAP mapping 122 29.3 LDAP User Two Factor Authentication Control 122 30.0 Active Directory Authentication 122 30.1 About Active Directory Integration 122 30.2 Default Virtual Directory Mapping for AD Users 124 30.2.1 Active Directory FTP Security Group 126 30.3 Authenticating Against more than one Active Directory Domain 126 30.4 Understanding Windows Authentication 126 30.4.1 The "Guest" Account 126 30.5 Active Directory User to Cerberus Group Mapping 126 30.5.1 Creating an AD User to Cerberus Group Mapping 127 30.5.2 Creating an AD Group to Cerberus Group Mapping 127 30.5.3 Removing an AD mapping 128 30.6 Domain Controller Bind Options 128 30.7 AD User Two Factor Authentication Control 129 31.0 Entering a license for Cerberus FTP Server 130 31.1 The Registration dialog box 130 32.0 The Synchronization Manager 132 32.1 Backup Server Requirements 133 32.2 Available Settings 134 32.2.1 Backup Server 134 32.2.2 Synchronization Settings 134 33.0 Server Certificates 134 33.1 What is a Server Certificate? 135 33.2 Can I just use a Self-Signed Certificate? 135 33.3 More Information 135 34.0 Certificate Signing Request 136 34.1 Creating a Certificate Signing Request 136 34.2 Submitting your CSR to a Certificate Authority 137 34.3 Assigning your Certificate and Private Key in Cerberus FTP Server 137 35.0 Installing a Digital Certificate 138 35.1 Digital Certificate Support 138 35.2 Creating a Self-Signed Certificate 138 35.2.1 Steps to Create a Self-Signed Certificate: 138 35.3 Using a Certificate created by a 3rd Party Certificate Authority 140 35.3.1
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • CERBERUS FTP SERVER 8.0] User Manual for Cerberus FTP Server 8.0
    V.8 Cerberus, LLC Grant Averett [CERBERUS FTP SERVER 8.0] User manual for Cerberus FTP Server 8.0. It contains detailed steps and help on configuring Cerberus FTP Server. CONTENTS Introduction .............................................................................................................................................. 11 Description ........................................................................................................................................... 11 Guide .................................................................................................................................................... 11 Minimum System Requirements .............................................................................................................. 12 Hardware Requirements ...................................................................................................................... 12 Operating Systems ................................................................................................................................ 12 Cerberus FTP Server 5.0, 6.0, and 7.0 ............................................................................................... 12 Cerberus FTP Server 8.0 and higher ................................................................................................. 12 Installation ................................................................................................................................................ 13 Upgrading an Existing Installation ............................................................................................................
    [Show full text]
  • Diverted Derived Design
    Diverted Derived Design Table of Contents Introduction 0 Motivations 1 Licenses 2 Design (as a) process 3 Distributions 4 Economies 5 Propositions 6 This book 7 Glossary 8 2 Diverted Derived Design Introduction The term open source is becoming popular among product designers. We see websites and initiatives appear with a lot of good intentions but sometimes missing the point and often creating confusion. Design magazines and blogs are always rushing into calling an openly published creation open source but rarely question the licenses or provide schematics or design files to download. We are furniture designers, hackers and artists who have been working with free/libre and open source software for quite some time. For us, applying these prirciples to product design was a natural extension, providing new areas to explore. But we also realized that designers coming to this with no prior open source experience had a lot of information to grasp before getting a clear picture of what could be open source product design. So we set ourselves to mobilize our knowledge in this book. We hope that this tool can be a base for teaching and learning about open source product design; a collective understanding of what one should know today to get started and join the movement; a reference students, amateurs and educators can have in their back pocket when they go out to explain what they are passionate about. How to read this book We have divided this book in sections that make sense for us. Each of these tries to address what we think is a general question you might have about open source product design.
    [Show full text]
  • Guide to Using Public Domain Tools
    Creative Commons makes sharing easy Public domain works are valuable because anyone What is the difference between can freely build upon, enhance, and reuse them for CC0 and the Public Domain Mark? any purposes without restriction under copyright or database law. CC0 (“CC Zero”) is intended for use only That’s why it’s important for creators to have a clear and by authors or holders of copyright and legally robust way to place their works in the public domain as related rights (including database rights), in connection Guide to completely as possible, and it’s also important for publishers with works that are still subject to those rights in one or and archives to have a standardized way to identify works that are already in the public domain. more countries. Creative Commons supports two distinct public domain tools, When CC0 is applied to a work, copyright and related using public rights are relinquished worldwide, making the work free the CC0 Public Domain Dedication and the Public Domain Mark. Creative Commons copyright licenses help authors from those restrictions to the greatest extent possible. manage their copyright on terms they choose. Conversely, CC0 domain tools enables authors and copyright owners who want to dedicate The Public Domain Mark (PDM) is used their works to the worldwide public domain to do so, and PDM to label works that are already free of facilitates the labeling and discovery of works that are already known copyright restrictions. Unlike CC0, PDM doesn’t free of known copyright restrictions. change the copyright status of a work.
    [Show full text]
  • IT Acronyms.Docx
    List of computing and IT abbreviations /.—Slashdot 1GL—First-Generation Programming Language 1NF—First Normal Form 10B2—10BASE-2 10B5—10BASE-5 10B-F—10BASE-F 10B-FB—10BASE-FB 10B-FL—10BASE-FL 10B-FP—10BASE-FP 10B-T—10BASE-T 100B-FX—100BASE-FX 100B-T—100BASE-T 100B-TX—100BASE-TX 100BVG—100BASE-VG 286—Intel 80286 processor 2B1Q—2 Binary 1 Quaternary 2GL—Second-Generation Programming Language 2NF—Second Normal Form 3GL—Third-Generation Programming Language 3NF—Third Normal Form 386—Intel 80386 processor 1 486—Intel 80486 processor 4B5BLF—4 Byte 5 Byte Local Fiber 4GL—Fourth-Generation Programming Language 4NF—Fourth Normal Form 5GL—Fifth-Generation Programming Language 5NF—Fifth Normal Form 6NF—Sixth Normal Form 8B10BLF—8 Byte 10 Byte Local Fiber A AAT—Average Access Time AA—Anti-Aliasing AAA—Authentication Authorization, Accounting AABB—Axis Aligned Bounding Box AAC—Advanced Audio Coding AAL—ATM Adaptation Layer AALC—ATM Adaptation Layer Connection AARP—AppleTalk Address Resolution Protocol ABCL—Actor-Based Concurrent Language ABI—Application Binary Interface ABM—Asynchronous Balanced Mode ABR—Area Border Router ABR—Auto Baud-Rate detection ABR—Available Bitrate 2 ABR—Average Bitrate AC—Acoustic Coupler AC—Alternating Current ACD—Automatic Call Distributor ACE—Advanced Computing Environment ACF NCP—Advanced Communications Function—Network Control Program ACID—Atomicity Consistency Isolation Durability ACK—ACKnowledgement ACK—Amsterdam Compiler Kit ACL—Access Control List ACL—Active Current
    [Show full text]
  • Fifty Years of Open Source Movement: an Analysis Through the Prism of Copyright Law
    FIFTY YEARS OF OPEN SOURCE MOVEMENT: AN ANALYSIS THROUGH THE PRISM OF COPYRIGHT LAW V.K. Unni* I. INTRODUCTION The evolution of the software industry is a case study in itself. This evolution has multiple phases and one such important phase, termed open source, deals with the manner in which software technology is held, developed, and distributed.1 Over the years, open source software has played a leading role in promoting the Internet infrastructure and thus programs utilizing open source software, such as Linux, Apache, and BIND, are very often used as tools to run various Internet and business applications.2 The origins of open source software can be traced back to 1964–65 when Bell Labs joined hands with the Massachusetts Institute of Technology (MIT) and General Electric (GE) to work on the development of MULTICS for creating a dynamic, modular computer system capable of supporting hundreds of users.3 During the early stages of development, open source software had a very slow beginning primarily because of some preconceived notions surrounding it. Firstly, open source software was perceived as a product of academics and hobbyist programmers.4 Secondly, it was thought to be technically inferior to proprietary software.5 However, with the passage of time, the technical issues got relegated to the backside and issues pertaining to copyright, licensing, warranty, etc., began to be debated across the globe.6 * Professor—Public Policy and Management, Indian Institute of Management Calcutta; Thomas Edison Innovation Fellow (2016–17), Center for the Protection of Intellectual Property, George Mason University School of Law. 1.
    [Show full text]
  • Unlicense Yourself: Set Your Code Free
    Unlicense Yourself: Set Your Code Free Like 232 Follow on Tumblr 138 What is the Unlicense? The Unlicense is a template for disclaiming copyright monopoly interest in software you've written; in other words, it is a template for dedicating your software to the public domain. It combines a copyright waiver patterned after the very successful public domain SQLite project with the no-warranty statement from the widely-used MIT/X11 license. Why Use the Unlicense? Because you have more important things to do than enriching lawyers or imposing petty restrictions on users of your code. How often have you passed up on utilizing and contributing to a great software library just because its open source license was not compatible with your own preferred flavor of open source? How many precious hours of your life have you spent deliberating how to license your software or worrying about licensing compatibility with other software? You will never get those hours back, but here's your chance to start cutting your losses. Life's too short, let's get back to coding. The Unlicense To opt out of the copyright industry's game altogether and set your code free, put your next software project into the public domain using the following (un)licensing statement: This is free and unencumbered software released into the public domain. Anyone is free to copy, modify, publish, use, compile, sell, or distribute this software, either in source code form or as a compiled binary, for any purpose, commercial or non-commercial, and by any means. In jurisdictions that recognize copyright laws, the author or authors of this software dedicate any and all copyright interest in the software to the public domain.
    [Show full text]
  • The Copyleft Movement: Creative Commons Licensing
    Centre for the Study of Communication and Culture Volume 26 (2007) No. 3 IN THIS ISSUE The Copyleft Movement: Creative Commons Licensing Sharee L. Broussard, MS APR Spring Hill College AQUARTERLY REVIEW OF COMMUNICATION RESEARCH ISSN: 0144-4646 Communication Research Trends Table of Contents Volume 26 (2007) Number 3 http://cscc.scu.edu The Copyleft Movement:Creative Commons Licensing Published four times a year by the Centre for the Study of Communication and Culture (CSCC), sponsored by the 1. Introduction . 3 California Province of the Society of Jesus. 2. Copyright . 3 Copyright 2007. ISSN 0144-4646 3. Protection Activity . 6 4. DRM . 7 Editor: William E. Biernatzki, S.J. 5. Copyleft . 7 Managing Editor: Paul A. Soukup, S.J. 6. Creative Commons . 8 Editorial assistant: Yocupitzia Oseguera 7. Internet Practices Encouraging Creative Commons . 11 Subscription: 8. Pros and Cons . 12 Annual subscription (Vol. 26) US$50 9. Discussion and Conclusion . 13 Payment by check, MasterCard, Visa or US$ preferred. Editor’s Afterword . 14 For payments by MasterCard or Visa, send full account number, expiration date, name on account, and signature. References . 15 Checks and/or International Money Orders (drawn on Book Reviews . 17 USA banks; for non-USA banks, add $10 for handling) should be made payable to Communication Research Journal Report . 37 Trends and sent to the managing editor Paul A. Soukup, S.J. Communication Department In Memoriam Santa Clara University Michael Traber . 41 500 El Camino Real James Halloran . 43 Santa Clara, CA 95053 USA Transfer by wire: Contact the managing editor. Add $10 for handling. Address all correspondence to the managing editor at the address shown above.
    [Show full text]
  • Tilburg University Free and Open Source Software Schellekens, M.H.M
    Tilburg University Free and Open Source Software Schellekens, M.H.M. Published in: The Future of the Public Domain Publication date: 2006 Link to publication in Tilburg University Research Portal Citation for published version (APA): Schellekens, M. H. M. (2006). Free and Open Source Software: An Answer to Commodification? In L. Guibault, & B. Hugenholtz (Eds.), The Future of the Public Domain: Identifying the Commons in Information Law (pp. 303- 323). (Information Law Series; No. 16). Kluwer Law International. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Download date: 27. sep. 2021 Free and open source software: an answer to commodification? Maurice Schellekens 1. Introduction Linux is a PC operating system which is distributed under the General Public License (hereinafter: GPL). The GPL allows for the (royalty-)free use, modification and redistribution of the software. Given these license conditions, Linux users believed they could use the operating system without too many license worries.
    [Show full text]
  • Elements of Free and Open Source Licenses: Features That Define Strategy
    Elements Of Free And Open Source Licenses: Features That Define Strategy CAN: Use/reproduce: Ability to use, copy / reproduce the work freely in unlimited quantities Distribute: Ability to distribute the work to third parties freely, in unlimited quantities Modify/merge: Ability to modify / combine the work with others and create derivatives Sublicense: Ability to license the work, including possible modifications (without changing the license if it is copyleft or share alike) Commercial use: Ability to make use of the work for commercial purpose or to license it for a fee Use patents: Rights to practice patent claims of the software owner and of the contributors to the code, in so far these rights are necessary to make full use of the software Place warranty: Ability to place additional warranty, services or rights on the software licensed (without holding the software owner and other contributors liable for it) MUST: Incl. Copyright: Describes whether the original copyright and attribution marks must be retained Royalty free: In case a fee (i.e. contribution, lump sum) is requested from recipients, it cannot be royalties (depending on the use) State changes: Source code modifications (author, why, beginning, end) must be documented Disclose source: The source code must be publicly available Copyleft/Share alike: In case of (re-) distribution of the work or its derivatives, the same license must be used/granted: no re-licensing. Lesser copyleft: While the work itself is copyleft, derivatives produced by the normal use of the work are not and could be covered by any other license SaaS/network: Distribution includes providing access to the work (to its functionalities) through a network, online, from the cloud, as a service Include license: Include the full text of the license in the modified software.
    [Show full text]
  • Copyright, an Incentive Or a Burden?
    Copyright, an Incentive or a Burden? Wolfgang Bein University of Nevada Las Vegas, USA, [email protected] Abstract A copyright provides protection for original artistic or literary work and is valid for the life of the owner plus 70 years. There is a growing tension between creative practices that require access to content that is often copyrighted, and increasingly restrictive intellectual property laws and policies governing access to copyrighted content. Very recently this has played out in the law suit between the media corporation Viacom and the Internet portal YouTube, which is owned by Google. This is against the background of a steadily emerging open source and creative commons culture. Milestones in the open source movement are the OpenOffice office suite, Netscape’s publication of the source code for its product as open software, Google’s library project, various free archives for scientific dissemination, such as Cornell University’s ArXiv. I. INTRODUCTION The gap between the cost of digital media and storage, and a copyrighted digital item (a CD or DVD) continually increases, as Internet is readily available, and the price of digitally duplicating anything capable of being transmitted via digital media dropped to near zero [1]. The use of a copyrighted material is less restrictive than other intellectual properties (patents, trademarks, service marks), even though the copyrighted material cannot be photocopied, scanned or copied in any way. But portions of it can be used for non-commercial purposes. The First Sale Doctrine (Copyright Act, 1976) does allow you to resell or give away the copy of the copyrighted item you bought.
    [Show full text]
  • Open Source Software Licenses
    Open Source Software Licences User Guide If you are working on a piece of software and you want to make it open source (i.e. freely available for others to use), there are questions you may need to consider, for example, whether you need a licence and why; and if so, how to choose a licence. This guide will help with those questions so that you have a better idea of what you need for your particular project. What is Open Source Software? ......................................................................................................... 1 Why do I need a licence for Open Source software? .......................................................................... 1 How do I choose a license? ................................................................................................................. 2 What if I have dependencies or my work is a derivative? .................................................................. 5 Combined Works and Compatibility ................................................................................................... 5 What if I want to change licenses? ..................................................................................................... 6 What if my software is protected by a patent? .................................................................................. 6 Can I commercialise Open Source Software? ..................................................................................... 6 Who should I speak to if I need help? ................................................................................................
    [Show full text]