Beruflich Dokumente
Kultur Dokumente
$
$
'
"
$
$
!
# *
%
&
# (
%
&
# )
%&
'
$ " #
' !#
'
' %&
#
' "#
' #
( !!"
'
'
'
(
( %$&
(
( #
"
#
$
!
"
#
$
!
"
!
!
!
“Unauthorized access to or use of data, systems or networks, including any
attempt to probe, scan or test the vulnerability of a system or network or to
breach security or authentication measures without express authorization
of the owner of the system or network”
“You may make network connections from Amazon EC2 hosted servers to
other hosts only with the permission and authorization of the destination
hosts and networks. Examples of unacceptable network traffic include:
• Unauthorized probes and port scans for vulnerabilities.
• Unauthorized penetration tests, traffic that circumvents authentication
systems or other unauthorized attempts to gain entry into any
systems.”
“You may not attempt to probe, scan, penetrate or test the
vulnerability of a Rackspace Cloud system or network
or to breach the Rackspace Cloud's security or
authentication measures, whether by passive or
intrusive techniques, without the Rackspace Cloud's
express written consent.”
)#$
&#
%% !$#%'"&(
$##
"
!
!
!
!
!
&
$"
#%("
!"'"
!
!
!
%
!
$
$
$
%
#
%
%
%
$
"
!
!#'%&&
! #'%&&