Security of the provided Service

Under no circumstances may you exploit the Service in order to:

  • gain unauthorized access to parts of the provided Offering that are restricted.

  • intercept (passively or actively) a data flow of the provided Service/ Offering that is restricted.

  • falsify or forge security mechanisms of the provided Service/ Offering. This includes forging protocol headers (e.g., IP, TCP or UDP) and the illegitimate use of the provided Service/ Offering to hide certain activities (e.g., using a proxy or providing a pseudonymous or anonymous network node through the provided Service/ Offering).

  • usage of the provided Service/ Offering to publish, send or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations ("spam"), including commercial advertising and informational announcements.

  • access or diminish resources (computational, storage or otherwise) of other users of the provided Service/ Offering.