ous computer code, files or programs such as trojan horses, worms, time bombs, or cancelbots; (e) interfere with or disrupt servers or networks connected to the Licensed Products or violate the regulations, policies or procedures of such networks; (f) access or attempt access to the Licensor???s other accounts, computer systems or networks not covered by this Agreement, through password mining or