System abuse is strictly prohibited. Designer Bytes, Inc. may terminate or 
    modify service immediately and may bill for any resulting support charges 
    if the client engages in system abuse. Following is a list of actions which 
    are defined to be system abuse. This list is non-exclusive; any action about 
    which there is any doubt should be referred to Designer Bytes, Inc. for evaluation. 
    
  
Actions 
    which constitute system abuse include, but are not limited to: 
  
    - 1. 
      attempting to circumvent user authentication or security of any host, network, 
      or account on Designer Bytes, Inc. network or the Internet at large ("cracking"); 
      
 2. attempting, in any way, to interfere with or deny service to any user 
      or any host on the Internet;
 3. forging email or USENET posting header information;
 4. sending unsolicited mail messages (i.e. "junk mail"); this includes adding 
      or attempting to add addresses to any mailing list without explicit positive 
      consent of the addressee.
 5. forwarding or posting "chain letters" (multiple forwarding) of any type;
 6. posting inappropriate messages to USENET newsgroups e.g., posting large 
      numbers of unsolicited posts indiscriminately ("spamming"), or posting encoded 
      binary files to USENET newsgroups not specifically named for that purpose;
 7. attempting to cancel, supersede, or otherwise interfere with email or 
      USENET posts other than one's own;
 8. engaging in harassment, whether through language, frequency, or size 
      of messages;
 9. using an account at another provider to promote a DBI hosted web site 
      in an abusive manner;
 10. using a DBI account or network connection to collect replies to messages 
      sent from another provider which violate these rules or those of that provider.
 11. reselling DBI services to third parties.