Web sites that host software program that is covertly downloaded to your user's equipment to collect details and monitor user exercise, and internet sites which can be contaminated with destructive or malicious software, particularly built to destruction, disrupt, assault or manipulate Computer system techniques with no user's consent, for instance