breach or otherwise circumvent any security or authentication measures;</li> <li>access, tamper with, or use non-public areas or parts of the Services, or shared areas of the Services you have not been invited to;</li> <li>interfere with or disrupt any user, host, or network, for example by sending a virus, overloading, flooding, spamming, or mail-bombing any part of the Services;</li> <li>send altered, deceptive or false source-identifying information, including "spoofing" or "phishing";</li> <li>