Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.145.37.219
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
gcc-4.8.5 /
[ HOME SHELL ]
Name
Size
Permission
Action
COPYING
17.58
KB
-rw-r--r--
COPYING.LIB
25.82
KB
-rw-r--r--
COPYING.RUNTIME
3.25
KB
-rw-r--r--
COPYING3
34.32
KB
-rw-r--r--
COPYING3.LIB
7.46
KB
-rw-r--r--
ChangeLog-1997.bz2
36.21
KB
-rw-r--r--
ChangeLog-1998.bz2
136.07
KB
-rw-r--r--
ChangeLog-1999.bz2
163.09
KB
-rw-r--r--
ChangeLog-2000.bz2
247.07
KB
-rw-r--r--
ChangeLog-2001.bz2
245.82
KB
-rw-r--r--
ChangeLog-2002.bz2
259.19
KB
-rw-r--r--
ChangeLog-2003.bz2
281.38
KB
-rw-r--r--
ChangeLog-2004.bz2
365.85
KB
-rw-r--r--
ChangeLog-2005.bz2
276.86
KB
-rw-r--r--
ChangeLog-2006.bz2
178.24
KB
-rw-r--r--
ChangeLog-2007.bz2
273.99
KB
-rw-r--r--
ChangeLog-2008.bz2
224.81
KB
-rw-r--r--
ChangeLog-2009.bz2
268.42
KB
-rw-r--r--
ChangeLog-2010.bz2
294.67
KB
-rw-r--r--
ChangeLog-2011.bz2
293.42
KB
-rw-r--r--
ChangeLog-2012.bz2
267.15
KB
-rw-r--r--
ChangeLog.bz2
98.36
KB
-rw-r--r--
ChangeLog.dataflow.bz2
36.77
KB
-rw-r--r--
ChangeLog.graphite.bz2
48.3
KB
-rw-r--r--
ChangeLog.lib.bz2
33.28
KB
-rw-r--r--
ChangeLog.ptr.bz2
4.88
KB
-rw-r--r--
ChangeLog.tree-ssa.bz2
129.79
KB
-rw-r--r--
ChangeLog.tuples.bz2
51.48
KB
-rw-r--r--
README.Portability
6.43
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : COPYING.RUNTIME
GCC RUNTIME LIBRARY EXCEPTION Version 3.1, 31 March 2009 Copyright (C) 2009 Free Software Foundation, Inc. <http://fsf.org/> Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. This GCC Runtime Library Exception ("Exception") is an additional permission under section 7 of the GNU General Public License, version 3 ("GPLv3"). It applies to a given file (the "Runtime Library") that bears a notice placed by the copyright holder of the file stating that the file is governed by GPLv3 along with this Exception. When you use GCC to compile a program, GCC may combine portions of certain GCC header files and runtime libraries with the compiled program. The purpose of this Exception is to allow compilation of non-GPL (including proprietary) programs to use, in this way, the header files and runtime libraries covered by this Exception. 0. Definitions. A file is an "Independent Module" if it either requires the Runtime Library for execution after a Compilation Process, or makes use of an interface provided by the Runtime Library, but is not otherwise based on the Runtime Library. "GCC" means a version of the GNU Compiler Collection, with or without modifications, governed by version 3 (or a specified later version) of the GNU General Public License (GPL) with the option of using any subsequent versions published by the FSF. "GPL-compatible Software" is software whose conditions of propagation, modification and use would permit combination with GCC in accord with the license of GCC. "Target Code" refers to output from any compiler for a real or virtual target processor architecture, in executable form or suitable for input to an assembler, loader, linker and/or execution phase. Notwithstanding that, Target Code does not include data in any format that is used as a compiler intermediate representation, or used for producing a compiler intermediate representation. The "Compilation Process" transforms code entirely represented in non-intermediate languages designed for human-written code, and/or in Java Virtual Machine byte code, into Target Code. Thus, for example, use of source code generators and preprocessors need not be considered part of the Compilation Process, since the Compilation Process can be understood as starting with the output of the generators or preprocessors. A Compilation Process is "Eligible" if it is done using GCC, alone or with other GPL-compatible software, or if it is done without using any work based on GCC. For example, using non-GPL-compatible Software to optimize any GCC intermediate representations would not qualify as an Eligible Compilation Process. 1. Grant of Additional Permission. You have permission to propagate a work of Target Code formed by combining the Runtime Library with Independent Modules, even if such propagation would otherwise violate the terms of GPLv3, provided that all Target Code was generated by Eligible Compilation Processes. You may then convey such a combination under terms of your choice, consistent with the licensing of the Independent Modules. 2. No Weakening of GCC Copyleft. The availability of this Exception does not imply any general presumption that third-party software is unaffected by the copyleft requirements of the license of GCC.
Close