UNSER SERVICE

Die metaSEC bietet Ihnen ein umfassendes Service-Konzept. Dieses gliedert sich in unterschiedliche, unten angeführte Themenbereiche. Zusätzlich zu dem allgemeinen Produktsupport können erweiterte Support und Service Level Agreements (SLA) direkt über uns oder einen unserer Partner abgeschlossen werden.

Aufgrund unserer Projekterfahrungen leisten wir auch häufig Unterstützung bei Problemen und Fragestellungen von Fremdsystemen. Bei besonderen oder komplexen Fragestellungen im Bereich Linux / Open Source Software zögern Sie bitte nicht unseren Support zu kontaktieren.

METASEC Produkt Support

Natürlich stehen wir Ihnen bei Problemen rund um unsere Produkte via E-Mail oder Telefon zur Verfügung. Sie erhalten schnellstmöglich eine kompetente Hilfe und Unterstützung bei der Problembehebung.

Selbstverständlich stehen wir Ihnen beratend zur Seite. Bitte versuchen Sie das Problem möglichst genau zu beschreiben (Produkt, Version, Patchlevel, eventuell andere Produkte die noch in Betracht kommen, Umstände, Reproduzierbarkeit, etc.). Unser Ticketsystem erreichen Sie unter support@metasec.de. Bei Bedarf erfolgt ein Rückruf von einem unserer Techniker.

METASEC Fernwartung und Remoteunterstützung

Sollten Sie eine Fernwartung oder direkte Unterstützung auf Ihrem Bildschirm wünschen können Sie dazu unseren Fernwartungsclient nutzen.

metaWIKI

In unserem metaWIKI finden Sie Dokumentationen zu unseren Produkten und Antworten auf gängige Fragen unserer Anwender. Darüber hinaus bietet das Wiki auch »Best Practice« Berichte und aktuelle Softwaredownloads.

METASEC Wiki

In unserem »alten« Wiki finden Sie nach wie vor Dokumentationen zu unseren Produkten sowie Softwaredownloads.

Legal rights/open source

metaSEC MIDAS:

This product contains code from the following software packages:

Copyright (C) 2006-2015 Teluu Inc.
Licensed under the GPL, version 2.0 (copy below).

Douglas C. Schmidt and his research group at Washington University, University of California, Irvine, and Vanderbilt University, Copyright (c) 1993-2006, all rights reserved.

Sun Microsystems, Inc.
This source code is a product of Sun Microsystems, Inc. and is provided for unrestricted use.  Users may copy or modify this source code without charge.

SUN SOURCE CODE IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.

Sun source code is provided with no support and without any obligation on the part of Sun Microsystems, Inc. to assist in its use, correction, modification or enhancement.

SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY THIS SOFTWARE OR ANY PART THEREOF.

In no event will Sun Microsystems, Inc. be liable for any lost revenue or profits or other special, indirect and consequential damages, even if Sun has been advised of the possibility of such damages.

Sun Microsystems, Inc.
2550 Garcia Avenue
Mountain View, California  94043

Copyright (C) 2006-2015 Teluu Inc.
This is an implementation of CRC32. See ISO 3309 and ITU-T V.42 for a formal specification

This file is partly taken from Crypto++ library (http://www.cryptopp.com) and http://www.di-mgt.com.au/crypto.html#CRC.

Since the original version of the code is put in public domain, this file is put on public domain as well.

Written by Colin Plumb in 1993 based on MD5 algorithm by Ron Rivest, no copyright is claimed.
This code implements the MD5 message-digest algorithm. The algorithm is due to Ron Rivest.  This code was written by Colin Plumb in 1993, no copyright is claimed.
This code is in the public domain; do with it what you wish.

Equivalent code is available from RSA Data Security, Inc.
This code has been tested against that, and is equivalent, except that you don’t need to include two pages of legalese with every copy.

To compute the message digest of a chunk of bytes, declare an MD5Context structure, pass it to MD5Init, call MD5Update as needed on buffers full of bytes, and then call MD5Final, which will fill a supplied 16-byte array with the digest.

Steve Reid, James H. Brown, Saul Kravitz, Ralph Giles
SHA-1 in C
By Steve Reid
100% Public Domain
—————–
Modified 7/98
By James H. Brown
Still 100% Public Domain
—————–
Modified 4/01
By Saul Kravitz
Still 100% PD
Modified to run on Compaq Alpha hardware.
—————–
Modified 07/2002
By Ralph Giles
Still 100% public domain

Milton Anderson
Public domain software.

Based on the Open Source API proposed by Ross Bencina, Copyright (c) 1999-2000 Phil Burk
Based on the Open Source API proposed by Ross Bencina
Copyright (c) 1999-2000 Phil Burk

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the „Software“), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

Copyright 1992, 1993, 1994 by Jutta Degener and Carsten Bormann, Technische Universitaet Berlin
Copyright 1992, 1993, 1994 by Jutta Degener and Carsten Bormann, Technische Universitaet Berlin

Any use of this software is permitted provided that this notice is not removed and that neither the authors nor the Technische Universitaet Berlin are deemed to have made any representations as to the suitability of this software for any purpose nor are held responsible for any defects of this software.  THERE IS ABSOLUTELY NO WARRANTY FOR THIS SOFTWARE.

As a matter of courtesy, the authors request to be informed about uses this software has found, about bugs in this software, and about any improvements that may be of general interest.

Berlin, 28.11.1994
Jutta Degener
Carsten Bormann

http://www.speex.org
Copyright 2002-2005
Xiph.org Foundation
Jean-Marc Valin
David Rowe
EpicGames
Analog Devices

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

– Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

– Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

– Neither the name of the Xiph.org Foundation nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS „AS IS“ AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

WebRTC Project
Copyright 2011 The WebRTC project authors

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

– Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

– Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

– Neither the name of Google nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS „AS IS“ AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

David A. McGrew, Cisco Systems, Inc.

Copyright (c) 2001-2006 Cisco Systems, Inc.
All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

Neither the name of the Cisco Systems, Inc. nor the names of its ontributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS „AS IS“ AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE  COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.