entering malicious software into the system or onto the computers of the Provider, especially inclusive of viruses, Trojan horses or internet bugs;</li> <li>unauthorized scanning of the network of other Publishers in search of security gaps;</li> <li>unauthorized monitoring of network traffic or other attempts of intercepting information reserved for the Provider or to other Publishers;</li> <li>