violation of security measures;,2.2.11. initiating, facilitating, inciting or using a domain name or URL hosted by a Vendor for the Client or,a Client's end user to direct or redirect any malicious traffic;,2.2.12. attempts to circumvent any user authentication or host, network, or account security;,2.2.13. actions aimed at obtaining unauthorized access to data not intended for the Service user (client);,2.2.14. stress tests and security checks, including: port scanning, PING Flood, packet substitution and,forgery of route information;,2.2.15. Denial of service attacks (DoS or DDoS);,2.2.16. spread of viruses and (or) IRC bots;,2.2.17. the creation of code to carry out malicious effects on third-party computers;,2.2.18. using the Provider's services in order to disrupt the functioning of the security system of system,resources or accounts (accounts) on the Provider's servers and resources or any other websites;,2.2.19. use or distribution of software created to disrupt the functioning of the security system or containing,computer viruses or Trojan programs. Examples of such software include, but are not limited to the,followingtypes:passwordmatchingprograms,passwordcrackersornetworkscanningtools,,cryptographers;,2.2.20. using the Provider's services to ensure the functioning of the cryptocurrency, including for its,generation and (or) storage and (or) mining (mining) using specialized software or in any other way;,2.2.21.