Using fake or misleading TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route. This prohibition does not include the use of aliases or anonymous remailers.</li> </ul>Network Abuse<p>You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. Prohibited activities include:</p> <ul> <li> <strong>Monitoring or Crawling.</strong> Monitoring or crawling of a System that impairs or disrupts the System being monitored or crawled, or other harvesting or scraping of any content of the Services.</li> <li> <strong>Deceitful Actions.</strong>