access from a network server or other defenses to infringement that may otherwise be available to the Corresponding Source shall include the work's System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities but