consists of applications which include viruses, worms and/or Trojan horses or another computer code, documents or programs created to interrupt, damage or Restrict the operation of any computer software program or hardware or telecommunications; You will be responsible for utilizing sufficient methods and checkpoints to satisfy your certain needs https://damieng603yoc4.wikicommunications.com/user