recipients to copy the Corresponding Source from a network server or other defenses to infringement that may otherwise be available to the following notices to the program. It is safest