Web sites that host software that may be covertly downloaded into a person's device to gather data and keep track of person activity, and web-sites which can be contaminated with destructive or destructive software program, specially created to destruction, disrupt, attack or manipulate Computer system methods with no person's consent, including vi