hacking or attempting to hack into third-party computer systems, hosting botnet-type aggressive services, spreading, posting, distributing or otherwise making available or transmitting viruses, worms, spyware, time bombs, trojan horses, malwares, ransonwares, attacks (such as DDos, DoS, scanning, spamming, brute force, etc.), other harmful or destructive component, or other computer programs with the purpose or effect of restricting, harming or altering the proper functioning of all the hardware or computer programs;</li> <li>