. . . " equipment or applications, or service to any user, host, or network, including by use of any programs, scripts, commands, viruses, worms, web bugs, harmful code, Trojan horses, other contaminants, or otherwise.This includes denial of service attacks, flooding of networks, deliberate attempts to overload a service or to burden excessively a service's resources, attempts to crash a host, and/" . .