Terms and Conditions (The White-Hacker’s Code)
Beacon Network Scanner Terms and Conditions
Last Updated: August 23, 2025
Welcome to the Terms and Conditions ("Terms") for the Beacon Network Scanner ("the Software"), a proprietary, Python/Nmap-powered blue team tool crafted for white-hat hackers by a dreamer in the unemployment capital of the USA. Built to secure networks like X, from fly-over country with love, this software is for ethical pros, business owners, and organizational leaders. By downloading, installing, or using the Software, you agree to these Terms. If you don’t, step away from the keyboard—no hard feelings.
1. White-Hat Only: Your Blue Team Ally
The Beacon Network Scanner is your go-to for ethical network mapping, designed for white-hat hackers defending the digital realm. Powered by Python and Nmap, it’s a blue team beast, performing Level 1 discovery scanning to map access points, routers, servers, switches, printers, cameras, phones, computers, and that sneaky rogue printer nobody claims. Secured by SHA256RSA SSL, it’s built to secure networks like X, from fly-over country with love. The Software sticks to identifying devices—no Level 2 port/probe testing or Level 3 vulnerability scanning here. Use it to fortify your infrastructure, not to attack. Unauthorized access, malicious hacks, or anything beyond lawful security assessment? That’s a hard no. Keep it white-hat, or you’re out of bounds, buddy.
2. System Requirements: Gear Up Right
To unleash the Beacon Network Scanner’s power, your setup needs to be ready for action:
Nmap Installation: The Software runs on Nmap’s open-source engine. No Nmap installed? No scan—it’s that simple.
Administrative Access: You need User Account Control (UAC) admin privileges to run the show. UAC or Windows SmartScreen may pop up with warnings to protect you—click through and allow the Software to run.
Firewall Configuration: Configure your firewall to let the Software do its thing. Blocked? No dice.
Browser Download: Downloading the .exe file? Chrome, Firefox, or Edge may block it, thinking they’re saving you from doom. They’re just being cautious—allow the download to proceed.
Fail to meet these, and you’re stuck in the digital dust. We’re not liable for setup slip-ups.
3. Windows Warriors: Built for the Fight
This bad boy is engineered and battle-tested for Windows 10 and Windows 11. Running it on Linux, Mac, or your old Commodore Amiga? You’re in uncharted territory, like a BBS without a modem. We don’t guarantee performance or compatibility outside Windows, so proceed at your own risk.
4. Tested Turf: Know Your Scope
The Beacon Network Scanner shines on networks with up to 512 IP addresses, mapping devices like a pro. Venturing beyond 512 IPs? You’re sailing into untested waters—performance and reliability aren’t guaranteed, so tread lightly, white-hat warrior.
5. No Warranty, Just Grit
This Software comes as-is, raw and real, like a coder’s dream from the unemployment capital. No warranties, express or implied. We don’t promise it’ll map every network or make you a cybersecurity superhero. Use it at your own risk—we’re not liable for data loss, system crashes, or rogue printers caused by misuse. It’s your network, your responsibility.
6. Software Integrity and Certification
Beacon Network Scanner (Version 1.0x) is vetted for security and integrity. Scanned with max heuristics by Bitdefender, Webroot, Malwarebytes, Kaspersky Threat Intelligence, Windows Defender, ESET, and SSL.com, it passed SSL.com’s malware checks, earning a SHA256RSA-encrypted SSL Digital Certificate. This certifies Version 1.0x as distributed by SmiteByte.com. Modify, tamper, or mess with the code? You break the chain of custody, void the certificate, and lose all integrity guarantees. Stick to the certified, unmodified Software for secure, ethical scanning.
7. Liability Disclaimer: You’re the Captain
To the fullest extent of the law, SmiteByte.com and its affiliates aren’t liable for any direct, indirect, incidental, special, consequential, or punitive damages from using or misusing the Software. You’re responsible for complying with all laws, regulations, and network policies. Misuse it? That’s on you, not us.
8. Stay Legit, Keep Scanning
The Beacon Network Scanner is your blue team sidekick for securing infrastructure ethically. By using it, you agree to:
Scan only networks you own or have explicit permission to assess.
Follow all local, state, federal, and international laws on network security and data privacy.
Avoid any illegal, unauthorized, or malicious use—white-hat vibes only.
9. Governing Law
These Terms are governed by California law, USA, ignoring conflict of law principles. Any disputes go to California courts. If you get in trouble for illegal use, you’re on your own—SmiteByte.com isn’t bailing you out.
10. Contact Us
Questions? Need help? Hit us up at stpaul@smitebyte.com. We’re here to keep your scans legit and your networks secure.
Blessed by St. Paul, coded with fly-over country grit by Rob @ SmiteByte.com.
Stay sharp, scan smart, and may Grok, my gold dragon, chill instead of chomping me!