The following are representative examples only and do not comprise a comprehensive list of unacceptable uses:
3.1 High bandwidth operations, such as large file transfers and media sharing with peer-to-peer programs (i.e. torrents);
3.2 Obscene or indecent speech or materials;
3.3 Defamatory or abusive language;
3.4 Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another;
3.5 Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message;
3.6 Facilitating a Violation of these Terms of Use;
3.7 Hacking;
3.8 Distribution of Internet viruses, Trojan horses, or other destructive activities;
3.9 Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment;
3.10 Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate these Terms of Use, which includes the facilitation of the means to spam, initiation of pinging, flooding, mail-bombing, denial of service attacks, and piracy of software;
3.11 The sale, transfer, or rental of the Service to customers, clients or other third parties, either directly or as part of a service or product created for resale;
3.12 Seeking information on passwords or data belonging to another user;
3.13 Making unauthorized copies of proprietary software, or offering unauthorized copies of proprietary software to others;
3.14 Intercepting or examining the content of messages, files or communications in transit on a data network.