Security of the provided Service

Under no circumstances may you exploit the Service in order to:

  • gain unauthorized access to parts of the provided Service that are restricted.

  • intercept (passively or actively) a data flow of the provided Service that is restricted.

  • falsify or forge security mechanisms of the provided Service. This includes forging protocol headers (e.g., IP, TCP or UDP) and the illegitimate use of the provided Service to hide certain activities (e.g., using a proxy or providing a pseudonymous or anonymous network node through the provided Service).

  • usage of the provided Service to publish, send or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations ("spam"), including commercial advertising and informational announcements.

  • access or diminish resources (computational, storage or otherwise) of other users of the provided Service.