Contains viruses, Trojan horses, worms, time bombs, corrupted files, or any other similar software or programs designed to, or capable of, disrupting, damaging or limiting the functionality of any software or hardware;</p> </li> <li> <p>Contains any kind of proxy server or other traffic relaying programs;</p> </li> <li> <p>