Attempt to probe, scan, or test the vulnerability of any Device, Service, software, system or network or breach any security or authentication measures, or to reverse engineer, decompile or otherwise attempt to gain the source code for any August Service, Licensed Software or Device;</li> <li>