(c) restricting, disrupting or disabling service to users, hosts, servers or networks. (d) illicitly reproducing TCP/IP packet headers. (e) disrupting network services and otherwise disrupting our ability to monitor the Services. (f) using any robot, spider, or other automatic device, process, or means to access the Services, for any purpose, including monitoring or copying any of the material on, or in, the Services.