Falsification of Origin. Forging TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route. The legitimate use of aliases and anonymous remailers is not prohibited by this provision. You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. Prohibited activities include: • Monitoring or Crawling. Monitoring or crawling of a System that impairs or disrupts the System being monitored or crawled. • Denial of Service (DoS). Inundating a target with communications requests so the target either cannot respond to legitimate traffic or responds so slowly that it becomes ineffective. • Intentional Interference. Interfering with the proper functioning of any System, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques.
Appears in 2 contracts
Sources: Terms and Conditions, User Agreement