{"id":305846,"date":"2018-05-31T08:28:35","date_gmt":"2018-05-31T08:28:35","guid":{"rendered":"https:\/\/www.adlice.com\/global-eula\/"},"modified":"2026-04-10T06:54:28","modified_gmt":"2026-04-10T06:54:28","slug":"endbenutzer-lizenzvereinbarung-eula","status":"publish","type":"page","link":"https:\/\/www.adlice.com\/de\/endbenutzer-lizenzvereinbarung-eula\/","title":{"rendered":"Endbenutzer-Lizenzabkommen"},"content":{"rendered":"\n<p class=\"has-white-color has-accent-background-color has-text-color has-background\"><strong>GLOSSAR<\/strong><\/p>\n\n\n\n<p>In dieser Vereinbarung verwenden wir einige verk\u00fcrzte Begriffe. Hier ist, was sie bedeuten:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Herausgeber<\/strong>: Adlice Software, das sind wir.<\/li>\n\n\n\n<li><strong>Software<\/strong>: Das Softwareprogramm, das wir in compilierter Form bereitstellen.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-accent-background-color has-text-color has-background\">&nbsp; VEREINBARUNG<\/p>\n\n\n\n<p>Diese Endbenutzer-Lizenzvereinbarung (\u201eEULA&#8221;) ist eine rechtliche Vereinbarung zwischen Ihnen (entweder als Einzelperson oder als einzelne juristische Person) und Adlice Software (\u201eHerausgeber&#8221;). Sie regelt die Nutzung unserer Software, die das Softwareprogramm und alle damit verbundenen Materialien umfasst.<\/p>\n\n\n\n<p>Durch die Installation, das Kopieren oder die Nutzung der Software akzeptieren Sie, an die Bedingungen dieser EULA gebunden zu sein. Wenn Sie diesen Bedingungen nicht zustimmen, installieren oder verwenden Sie die Software bitte nicht.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-accent-background-color has-text-color has-background\"> SOFTWAREPRODUKT-LIZENZ <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Kostenlose Version<\/strong>: Diese Version ist kostenlos f\u00fcr pers\u00f6nliche Nutzung, gemeinn\u00fctzige Organisationen und Bildungszwecke. Sie k\u00f6nnen sie in CD-ROM\/DVD-ROM-Distributionen einbinden, d\u00fcrfen aber nicht daf\u00fcr bezahlen. Sie k\u00f6nnen sie frei verteilen, sofern sie unver\u00e4ndert bleibt.<\/li>\n\n\n\n<li><strong>Premium\/Pro-Version<\/strong>: Diese Version kann an Einzelpersonen oder Unternehmen als Teil Ihres Gesch\u00e4fts verkauft werden.<\/li>\n\n\n\n<li><strong>Unternehmensnutzung<\/strong>: Die kostenlose Version kann nicht in einer Unternehmensumgebung verwendet werden, wenn eine Pro-Version verf\u00fcgbar ist. Wenn Sie diese in einer Unternehmensumgebung nutzen m\u00f6chten, erwerben Sie bitte eine Lizenz.<\/li>\n\n\n\n<li><strong>Warnung f\u00fcr gro\u00dfe Unternehmen<\/strong>: Die Software ist nicht f\u00fcr die Verwendung durch Unternehmen mit 50 oder mehr Mitarbeitern ausgelegt. Wir raten dringend von der Verwendung in solchen Umgebungen ohne unsere ausdr\u00fcckliche schriftliche Genehmigung ab.<\/li>\n<\/ul>\n\n\n\n<p><br><strong>1. GEW\u00c4HRUNG DER LIZENZ<\/strong><\/p>\n\n\n\n<p>Diese EULA r\u00e4umt Ihnen die folgenden Rechte ein:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Installation und Nutzung<\/strong>: Sie d\u00fcrfen eine unbegrenzte Anzahl von Kopien der Software installieren und verwenden.<\/li>\n\n\n\n<li><strong>Vervielf\u00e4ltigung und Verbreitung<\/strong>: Sie d\u00fcrfen eine unbegrenzte Anzahl von Kopien der Software vervielf\u00e4ltigen und verbreiten, vorausgesetzt, jede Kopie ist vollst\u00e4ndig, enth\u00e4lt alle Urheberrechts- und Markenhinweise und wird von dieser EULA begleitet. Sie k\u00f6nnen die Software als eigenst\u00e4ndiges Produkt oder zusammen mit Ihrem eigenen Produkt verbreiten, solange es nicht separat verkauft wird, es sei denn, es handelt sich um eine Pro-Versions-Lizenz.<\/li>\n<\/ul>\n\n\n\n<p><strong>2. SONSTIGE RECHTE UND EINSCHR\u00c4NKUNGEN<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Reverse Engineering<\/strong>: Sie d\u00fcrfen die Software nicht reverse engineeren, dekompilieren oder disassemblieren, es sei denn, dies ist ausdr\u00fccklich durch geltende Gesetze zul\u00e4ssig.<\/li>\n\n\n\n<li><strong>Updates<\/strong>: Software-Updates werden kostenlos bereitgestellt.<\/li>\n\n\n\n<li><strong>Einzelnes Produkt<\/strong>: Die Software wird als einzelnes Produkt lizenziert. Seine Komponenten d\u00fcrfen nicht zur Verwendung auf mehr als einem Computer aufgetrennt werden.<\/li>\n\n\n\n<li><strong>\u00dcbertragung<\/strong>: Sie d\u00fcrfen alle Ihre Rechte aus dieser EULA dauerhaft \u00fcbertragen, vorausgesetzt, der Empf\u00e4nger akzeptiert ihre Bedingungen.<\/li>\n\n\n\n<li><strong>Beendigung<\/strong>: Wenn Sie die Bedingungen dieser EULA nicht einhalten, k\u00f6nnen wir diese beenden. In diesem Fall m\u00fcssen Sie alle Kopien der Software vernichten.<\/li>\n<\/ul>\n\n\n\n<p><strong>3. URHEBERRECHT<\/strong><\/p>\n\n\n\n<p>Alle Rechte, einschlie\u00dflich Urheberrechte, an der Software liegen beim Herausgeber. Die Software ist durch Urheberrechtsgesetze gesch\u00fctzt, und Sie m\u00fcssen sie wie jedes andere urheberrechtlich gesch\u00fctzte Material behandeln.<\/p>\n\n\n\n<p><strong>4. BEGRENZTE GEW\u00c4HRLEISTUNG<\/strong><\/p>\n\n\n\n<p><strong>KEINE GEW\u00c4HRLEISTUNGEN<\/strong>: Die Software wird \u201ewie besehen&#8221; ohne irgendwelche Gew\u00e4hrleistungen, weder ausdr\u00fccklich noch stillschweigend, einschlie\u00dflich, aber nicht beschr\u00e4nkt auf Gew\u00e4hrleistungen der Marktg\u00e4ngigkeit, Eignung f\u00fcr einen bestimmten Zweck und Nichtverletzung bereitgestellt. Sie nutzen die Software auf eigenes Risiko.<\/p>\n\n\n\n<p><strong>5. HAFTUNGSBESCHR\u00c4NKUNG<\/strong><\/p>\n\n\n\n<p>Wir haften nicht f\u00fcr besondere, Folge-, zuf\u00e4llige oder indirekte Sch\u00e4den, die sich aus der Nutzung oder der Unf\u00e4higkeit zur Nutzung der Software ergeben, auch wenn wir \u00fcber die M\u00f6glichkeit solcher Sch\u00e4den unterrichtet sind.<\/p>\n\n\n\n<p>Speziell haftet Adlice Software nicht f\u00fcr finanzielle Verluste, Datenverluste oder Maschinenausf\u00e4lle, die sich aus der Nutzung der Software ergeben. Obwohl wir uns bem\u00fchen, zuverl\u00e4ssige Sicherheitsl\u00f6sungen bereitzustellen, garantieren wir nicht, dass die Software fehlerfrei ist oder gegen alle Bedrohungen sch\u00fctzt.<\/p>\n\n\n\n<p><strong>6. DATENERFASSUNG<\/strong><\/p>\n\n\n\n<p>Die Software kann anonyme interne Daten sammeln, einschlie\u00dflich Informationen zur Malware-Erkennung, und diese zur Analyse an uns senden. Diese Funktion kann in der Premium-Version deaktiviert werden. Durch die Nutzung der kostenlosen Version stimmen Sie dieser Datenerfassung zu.<\/p>\n\n\n\n<p><strong>7. DATENHOCHLADEN UND ANALYSE<\/strong><\/p>\n\n\n\n<p>Durch die Nutzung der Software erkennen Sie an und stimmen zu, dass bestimmte Dateien, einschlie\u00dflich ausf\u00fchrbarer Dateien, zur Analyse auf unsere Server hochgeladen werden k\u00f6nnen, um Sicherheitsbedrohungen zu identifizieren und die Software zu verbessern. Diese Dateien k\u00f6nnen mit Drittanbietern geteilt werden, um die Sicherheitsma\u00dfnahmen zu verbessern. Alle Daten werden gem\u00e4\u00df unserer Datenschutzrichtlinie und der geltenden Datenschutzgesetze behandelt.<\/p>\n\n\n\n<p><strong>8. LIZENZIERUNG<\/strong><\/p>\n\n\n\n<p>Die Premium-Version der Software wird basierend auf der w\u00e4hrend des Kaufs angegebenen Anzahl von Ger\u00e4ten lizenziert. Jeder Lizenzschl\u00fcssel kann die Nutzung der Software auf mehreren Ger\u00e4ten autorisieren, je nachdem, wie viele Ger\u00e4te zum Zeitpunkt des Kaufs dem Lizenzschl\u00fcssel zugeordnet sind. Dies schlie\u00dft Hardware-Partitionen und virtuelle Maschinen ein, die als separate Ger\u00e4te betrachtet werden. Stellen Sie sicher, dass die Anzahl der Ger\u00e4te, die die Software verwenden, die durch Ihren Lizenzschl\u00fcssel autorisierte Anzahl nicht \u00fcberschreitet.<\/p>\n\n\n\n<p><strong>9. COMMUNITY-FEEDBACK<\/strong><\/p>\n\n\n\n<p>Durch Aktivieren der Funktion \u201eCommunity Feedback&#8221; in \u201eUCheck&#8221; (in jeder Version) stimmen Sie zu, dass die Software bestimmte Daten von Ihrem Computer sammelt. Dies umfasst Informationen wie die Liste der installierten Software, ihre Versionsnummern, Firmennamen und Installationsorte. Die gesammelten Daten werden anonymisiert, um Ihre Privatsph\u00e4re zu sch\u00fctzen, und werden ausschlie\u00dflich zur Verbesserung unserer Dienste und der Funktionalit\u00e4t der Software verwendet. Sie werden nicht f\u00fcr kommerzielle Zwecke verwendet oder an Dritte f\u00fcr Marketing-Zwecke weitergegeben. Sie k\u00f6nnen diese Funktion jederzeit \u00fcber die Einstellungen der Software deaktivieren.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-accent-background-color has-text-color has-background\">THIRD PARTY LICENSES<\/p>\n\n\n\n<p><br><strong>JANSSON<\/strong><\/p>\n\n\n\n<div style=\"height:250px;overflow-y:scroll\"><pre>\nCopyright (c) 2009-2018 Petri Lehtinen <petri@digip.org>\n\nPermission is hereby granted, free of charge, to any person obtaining a copy\nof this software and associated documentation files (the \"Software\"), to deal\nin the Software without restriction, including without limitation the rights\nto use, copy, modify, merge, publish, distribute, sublicense, and\/or sell\ncopies of the Software, and to permit persons to whom the Software is\nfurnished to do so, subject to the following conditions:\n\nThe above copyright notice and this permission notice shall be included in\nall copies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\nIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\nFITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\nAUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\nLIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\nOUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN\nTHE SOFTWARE.\n<\/pre><\/div>\n\n\n\n<p><br><strong>OpenSSL<\/strong><\/p>\n\n\n\n<div style=\"height:250px;overflow-y:scroll\"><pre>OpenSSL License\n  ---------------\n\n\/* ====================================================================\n * Copyright (c) 1998-2018 The OpenSSL Project.  All rights reserved.\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the following conditions\n * are met:\n *\n * 1. Redistributions of source code must retain the above copyright\n *    notice, this list of conditions and the following disclaimer. \n *\n * 2. Redistributions in binary form must reproduce the above copyright\n *    notice, this list of conditions and the following disclaimer in\n *    the documentation and\/or other materials provided with the\n *    distribution.\n *\n * 3. All advertising materials mentioning features or use of this\n *    software must display the following acknowledgment:\n *    \"This product includes software developed by the OpenSSL Project\n *    for use in the OpenSSL Toolkit. (http:\/\/www.openssl.org\/)\"\n *\n * 4. The names \"OpenSSL Toolkit\" and \"OpenSSL Project\" must not be used to\n *    endorse or promote products derived from this software without\n *    prior written permission. For written permission, please contact\n *    openssl-core@openssl.org.\n *\n * 5. Products derived from this software may not be called \"OpenSSL\"\n *    nor may \"OpenSSL\" appear in their names without prior written\n *    permission of the OpenSSL Project.\n *\n * 6. Redistributions of any form whatsoever must retain the following\n *    acknowledgment:\n *    \"This product includes software developed by the OpenSSL Project\n *    for use in the OpenSSL Toolkit (http:\/\/www.openssl.org\/)\"\n *\n * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY\n * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\n * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR\n * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,\n * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT\n * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;\n * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\n * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,\n * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)\n * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED\n * OF THE POSSIBILITY OF SUCH DAMAGE.\n * ====================================================================\n *\n * This product includes cryptographic software written by Eric Young\n * (eay@cryptsoft.com).  This product includes software written by Tim\n * Hudson (tjh@cryptsoft.com).\n *\n *\/\n\n Original SSLeay License\n -----------------------\n\n\/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)\n * All rights reserved.\n *\n * This package is an SSL implementation written\n * by Eric Young (eay@cryptsoft.com).\n * The implementation was written so as to conform with Netscapes SSL.\n * \n * This library is free for commercial and non-commercial use as long as\n * the following conditions are aheared to.  The following conditions\n * apply to all code found in this distribution, be it the RC4, RSA,\n * lhash, DES, etc., code; not just the SSL code.  The SSL documentation\n * included with this distribution is covered by the same copyright terms\n * except that the holder is Tim Hudson (tjh@cryptsoft.com).\n * \n * Copyright remains Eric Young's, and as such any Copyright notices in\n * the code are not to be removed.\n * If this package is used in a product, Eric Young should be given attribution\n * as the author of the parts of the library used.\n * This can be in the form of a textual message at program startup or\n * in documentation (online or textual) provided with the package.\n * \n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the following conditions\n * are met:\n * 1. Redistributions of source code must retain the copyright\n *    notice, this list of conditions and the following disclaimer.\n * 2. Redistributions in binary form must reproduce the above copyright\n *    notice, this list of conditions and the following disclaimer in the\n *    documentation and\/or other materials provided with the distribution.\n * 3. All advertising materials mentioning features or use of this software\n *    must display the following acknowledgement:\n *    \"This product includes cryptographic software written by\n *     Eric Young (eay@cryptsoft.com)\"\n *    The word 'cryptographic' can be left out if the rouines from the library\n *    being used are not cryptographic related :-).\n * 4. If you include any Windows specific code (or a derivative thereof) from \n *    the apps directory (application code) you must include an acknowledgement:\n *    \"This product includes software written by Tim Hudson (tjh@cryptsoft.com)\"\n * \n * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND\n * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\n * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\n * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE\n * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\n * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\n * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\n * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\n * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\n * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\n * SUCH DAMAGE.\n * \n * The licence and distribution terms for any publically available version or\n * derivative of this code cannot be changed.  i.e. this code cannot simply be\n * copied and put under another distribution licence\n * [including the GNU Public Licence.]\n *\/\n<\/pre><\/div>\n\n\n\n<p><br><strong>LibSSH2<\/strong><\/p>\n\n\n\n<div style=\"height:250px;overflow-y:scroll\"><pre>\n\/* Copyright (c) 2004-2007 Sara Golemon <sarag@libssh2.org>\n * Copyright (c) 2005,2006 Mikhail Gusarov <dottedmag@dottedmag.net>\n * Copyright (c) 2006-2007 The Written Word, Inc.\n * Copyright (c) 2007 Eli Fant <elifantu@mail.ru>\n * Copyright (c) 2009-2014 Daniel Stenberg\n * Copyright (C) 2008, 2009 Simon Josefsson\n * All rights reserved.\n *\n * Redistribution and use in source and binary forms,\n * with or without modification, are permitted provided\n * that the following conditions are met:\n *\n *   Redistributions of source code must retain the above\n *   copyright notice, this list of conditions and the\n *   following disclaimer.\n *\n *   Redistributions in binary form must reproduce the above\n *   copyright notice, this list of conditions and the following\n *   disclaimer in the documentation and\/or other materials\n *   provided with the distribution.\n *\n *   Neither the name of the copyright holder nor the names\n *   of any other contributors may be used to endorse or\n *   promote products derived from this software without\n *   specific prior written permission.\n *\n * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND\n * CONTRIBUTORS \"AS IS\" AND ANY EXPRESS OR IMPLIED WARRANTIES,\n * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES\n * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\n * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR\n * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,\n * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,\n * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR\n * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS\n * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING\n * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE\n * USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY\n * OF SUCH DAMAGE.\n *\/\n<\/pre><\/div>\n\n\n\n<p><br><strong>LibCURL<\/strong><\/p>\n\n\n\n<div style=\"height:250px;overflow-y:scroll\"><pre>\nCOPYRIGHT AND PERMISSION NOTICE\n\nCopyright (c) 1996 - 2016, Daniel Stenberg, <daniel@haxx.se>, and many\ncontributors, see the THANKS file.\n\nAll rights reserved.\n\nPermission to use, copy, modify, and distribute this software for any purpose\nwith or without fee is hereby granted, provided that the above copyright\nnotice and this permission notice appear in all copies.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\nIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\nFITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN\nNO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,\nDAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR\nOTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE\nOR OTHER DEALINGS IN THE SOFTWARE.\n\nExcept as contained in this notice, the name of a copyright holder shall not\nbe used in advertising or otherwise to promote the sale, use or other dealings\nin this Software without prior written authorization of the copyright holder.\n<\/pre><\/div>\n\n\n\n<p><br><strong>LibYara<\/strong><\/p>\n\n\n\n<div style=\"height:250px;overflow-y:scroll\"><pre>Copyright (c) 2007-2016. The YARA Authors. All Rights Reserved.\n\nRedistribution and use in source and binary forms, with or without modification,\nare permitted provided that the following conditions are met:\n\n1. Redistributions of source code must retain the above copyright notice, this\nlist of conditions and the following disclaimer.\n\n2. Redistributions in binary form must reproduce the above copyright notice,\nthis list of conditions and the following disclaimer in the documentation and\/or\nother materials provided with the distribution.\n\n3. Neither the name of the copyright holder nor the names of its contributors\nmay be used to endorse or promote products derived from this software without\nspecific prior written permission.\n\nTHIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS \"AS IS\" AND\nANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED\nWARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE\nDISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR\nANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES\n(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;\nLOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON\nANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT\n(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS\nSOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n<\/pre><\/div>\n\n\n\n<p><br><strong>LibZip<\/strong><\/p>\n\n\n\n<div style=\"height:250px;overflow-y:scroll\"><pre>Copyright (C) 1999-2016 Dieter Baron and Thomas Klausner\n\nThe authors can be contacted at <libzip@nih.at>\n\nRedistribution and use in source and binary forms, with or without\nmodification, are permitted provided that the following conditions\nare met:\n\n1. Redistributions of source code must retain the above copyright\n  notice, this list of conditions and the following disclaimer.\n\n2. Redistributions in binary form must reproduce the above copyright\n  notice, this list of conditions and the following disclaimer in\n  the documentation and\/or other materials provided with the\n  distribution.\n\n3. The names of the authors may not be used to endorse or promote\n  products derived from this software without specific prior\n  written permission.\n\nTHIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS'' AND ANY EXPRESS\nOR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED\nWARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\nARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY\nDIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\nDAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE\nGOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS\nINTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER\nIN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR\nOTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN\nIF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n\n\n\nFor AES encryption support, files under the following license are used:\n\n---------------------------------------------------------------------------\nCopyright (c) 2002, Dr Brian Gladman <                 >, Worcester, UK.\nAll rights reserved.\n\nLICENSE TERMS\n\nThe free distribution and use of this software in both source and binary\nform is allowed (with or without changes) provided that:\n\n  1. distributions of this source code include the above copyright\n     notice, this list of conditions and the following disclaimer;\n\n  2. distributions in binary form include the above copyright\n     notice, this list of conditions and the following disclaimer\n     in the documentation and\/or other associated materials;\n\n  3. the copyright holder's name is not used to endorse products\n     built using this software without specific written permission.\n\nALTERNATIVELY, provided that this notice is retained in full, this product\nmay be distributed under the terms of the GNU General Public License (GPL),\nin which case the provisions of the GPL apply INSTEAD OF those given above.\n\nDISCLAIMER\n\nThis software is provided 'as is' with no explicit or implied warranties\nin respect of its properties, including, but not limited to, correctness\nand\/or fitness for purpose.\n---------------------------------------------------------------------------\nIssue Date: 18th November 2008\n<\/pre><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>GLOSSAR In dieser Vereinbarung verwenden wir einige verk\u00fcrzte Begriffe. Hier ist, was sie bedeuten: &nbsp; VEREINBARUNG Diese Endbenutzer-Lizenzvereinbarung (\u201eEULA&#8221;) ist eine rechtliche Vereinbarung zwischen Ihnen (entweder als Einzelperson oder als einzelne juristische Person) und Adlice Software (\u201eHerausgeber&#8221;). Sie regelt die Nutzung unserer Software, die das Softwareprogramm und alle damit verbundenen Materialien umfasst. Durch die Installation,&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-305846","page","type-page","status-publish","hentry","description-off"],"views":0,"featured_image_src":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Endbenutzer-Lizenzvereinbarung (EULA) \u2022 Adlice Software<\/title>\n<meta name=\"description\" content=\"Endbenutzer-Lizenzvereinbarung (EULA) f\u00fcr Adlice Software. Lesen Sie die vollst\u00e4ndigen Bedingungen f\u00fcr die Nutzung unserer Sicherheitssoftware, einschlie\u00dflich Lizenzierung, Haftung und Datenschutz.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adlice.com\/de\/endbenutzer-lizenzvereinbarung-eula\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Endbenutzer-Lizenzvereinbarung (EULA) \u2022 Adlice Software\" \/>\n<meta property=\"og:description\" content=\"Endbenutzer-Lizenzvereinbarung (EULA) f\u00fcr Adlice Software. Lesen Sie die vollst\u00e4ndigen Bedingungen f\u00fcr die Nutzung unserer Sicherheitssoftware, einschlie\u00dflich Lizenzierung, Haftung und Datenschutz.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adlice.com\/de\/endbenutzer-lizenzvereinbarung-eula\/\" \/>\n<meta property=\"og:site_name\" content=\"Adlice Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RogueKiller\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-10T06:54:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\" \/>\n\t<meta property=\"og:image:width\" content=\"276\" \/>\n\t<meta property=\"og:image:height\" content=\"276\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.adlice.com\/de\/endbenutzer-lizenzvereinbarung-eula\/\",\"url\":\"https:\/\/www.adlice.com\/de\/endbenutzer-lizenzvereinbarung-eula\/\",\"name\":\"Endbenutzer-Lizenzvereinbarung (EULA) \u2022 Adlice Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/#website\"},\"datePublished\":\"2018-05-31T08:28:35+00:00\",\"dateModified\":\"2026-04-10T06:54:28+00:00\",\"description\":\"Endbenutzer-Lizenzvereinbarung (EULA) f\u00fcr Adlice Software. Lesen Sie die vollst\u00e4ndigen Bedingungen f\u00fcr die Nutzung unserer Sicherheitssoftware, einschlie\u00dflich Lizenzierung, Haftung und Datenschutz.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.adlice.com\/de\/endbenutzer-lizenzvereinbarung-eula\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.adlice.com\/de\/endbenutzer-lizenzvereinbarung-eula\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.adlice.com\/de\/endbenutzer-lizenzvereinbarung-eula\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.adlice.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Endbenutzer-Lizenzabkommen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.adlice.com\/#website\",\"url\":\"https:\/\/www.adlice.com\/\",\"name\":\"Adlice Software\",\"description\":\"Anti-malware and analysis tools\",\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.adlice.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.adlice.com\/#organization\",\"name\":\"Adlice Software\",\"url\":\"https:\/\/www.adlice.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"width\":276,\"height\":276,\"caption\":\"Adlice Software\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/RogueKiller\",\"https:\/\/x.com\/AdliceSoftware\",\"https:\/\/fr.linkedin.com\/company\/adlice-software\",\"https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Endbenutzer-Lizenzvereinbarung (EULA) \u2022 Adlice Software","description":"Endbenutzer-Lizenzvereinbarung (EULA) f\u00fcr Adlice Software. Lesen Sie die vollst\u00e4ndigen Bedingungen f\u00fcr die Nutzung unserer Sicherheitssoftware, einschlie\u00dflich Lizenzierung, Haftung und Datenschutz.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adlice.com\/de\/endbenutzer-lizenzvereinbarung-eula\/","og_locale":"de_DE","og_type":"article","og_title":"Endbenutzer-Lizenzvereinbarung (EULA) \u2022 Adlice Software","og_description":"Endbenutzer-Lizenzvereinbarung (EULA) f\u00fcr Adlice Software. Lesen Sie die vollst\u00e4ndigen Bedingungen f\u00fcr die Nutzung unserer Sicherheitssoftware, einschlie\u00dflich Lizenzierung, Haftung und Datenschutz.","og_url":"https:\/\/www.adlice.com\/de\/endbenutzer-lizenzvereinbarung-eula\/","og_site_name":"Adlice Software","article_publisher":"https:\/\/www.facebook.com\/RogueKiller","article_modified_time":"2026-04-10T06:54:28+00:00","og_image":[{"width":276,"height":276,"url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@AdliceSoftware","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.adlice.com\/de\/endbenutzer-lizenzvereinbarung-eula\/","url":"https:\/\/www.adlice.com\/de\/endbenutzer-lizenzvereinbarung-eula\/","name":"Endbenutzer-Lizenzvereinbarung (EULA) \u2022 Adlice Software","isPartOf":{"@id":"https:\/\/www.adlice.com\/#website"},"datePublished":"2018-05-31T08:28:35+00:00","dateModified":"2026-04-10T06:54:28+00:00","description":"Endbenutzer-Lizenzvereinbarung (EULA) f\u00fcr Adlice Software. Lesen Sie die vollst\u00e4ndigen Bedingungen f\u00fcr die Nutzung unserer Sicherheitssoftware, einschlie\u00dflich Lizenzierung, Haftung und Datenschutz.","breadcrumb":{"@id":"https:\/\/www.adlice.com\/de\/endbenutzer-lizenzvereinbarung-eula\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adlice.com\/de\/endbenutzer-lizenzvereinbarung-eula\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.adlice.com\/de\/endbenutzer-lizenzvereinbarung-eula\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adlice.com\/de\/"},{"@type":"ListItem","position":2,"name":"Endbenutzer-Lizenzabkommen"}]},{"@type":"WebSite","@id":"https:\/\/www.adlice.com\/#website","url":"https:\/\/www.adlice.com\/","name":"Adlice Software","description":"Anti-malware and analysis tools","publisher":{"@id":"https:\/\/www.adlice.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adlice.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.adlice.com\/#organization","name":"Adlice Software","url":"https:\/\/www.adlice.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","width":276,"height":276,"caption":"Adlice Software"},"image":{"@id":"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RogueKiller","https:\/\/x.com\/AdliceSoftware","https:\/\/fr.linkedin.com\/company\/adlice-software","https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ"]}]}},"_links":{"self":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/pages\/305846","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/comments?post=305846"}],"version-history":[{"count":1,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/pages\/305846\/revisions"}],"predecessor-version":[{"id":305849,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/pages\/305846\/revisions\/305849"}],"wp:attachment":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/media?parent=305846"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}