Security of the provided Service
Under no circumstances may you exploit the Service in order to:
-
gain unauthorized access to parts of the provided Offering that are restricted.
-
intercept (passively or actively) a data flow of the provided Service/ Offering that is restricted.
-
falsify or forge security mechanisms of the provided Service/ Offering. This includes forging protocol headers (e.g., IP, TCP or UDP) and the illegitimate use of the provided Service/ Offering to hide certain activities (e.g., using a proxy or providing a pseudonymous or anonymous network node through the provided Service/ Offering).
-
usage of the provided Service/ Offering to publish, send or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations ("spam"), including commercial advertising and informational announcements.
-
access or diminish resources (computational, storage or otherwise) of other users of the provided Service/ Offering.