. . . . "(f) emulating or faking usage of the Site or Services; (g) violating or attempting to violate any security features of the Site; (h) using manual or automated software, devices, scripts, robots, or other means or processes to access, \"scrape, crawl, or \"spider any pages contained in the Site; (i) introducing viruses, worms, software, Trojan horses, or other similar harmful code into the Site o" .