with malicious intent

  • 101List of Danny Phantom characters — This is a list of cartoon characters from the Nickelodeon animated television series Danny Phantom. The series centers around young Danny Fenton and his coming of age story as a half ghost superhero to the town of Amity Park. He gradually grows,… …

    Wikipedia

  • 102Criticism of Facebook — Facebook s growth as an Internet social networking site has met criticism on a range of issues, including online privacy, child safety, and the inability to terminate accounts without first manually deleting the content. In 2008, many companies… …

    Wikipedia

  • 103fraud — n [Latin fraud fraus] 1 a: any act, expression, omission, or concealment calculated to deceive another to his or her disadvantage; specif: a misrepresentation or concealment with reference to some fact material to a transaction that is made with… …

    Law dictionary

  • 104blasphemy — blas·phe·my / blas fə mē/ n pl mies: the crime of insulting or showing contempt or lack of reverence for God or a religion and its doctrines and writings and esp. God as perceived by Christianity and Christian doctrines and writings see also… …

    Law dictionary

  • 105Winny — Infobox Software name = Winny caption = Screenshot of Winny developer = Isamu Kaneko (金子勇) latest release version = v2.0β7.1 latest release date = November 11, 2003 operating system = Windows genre = peer to peer license = Closed source website …

    Wikipedia

  • 106ClueNet — Motto We believe that much can be done when intelligent and helpful people all come together in one place.[1] Formation January 21, 2007 ( …

    Wikipedia

  • 107List of computer criminals — Hacker Adrian Lamo (left) with contemporaries Kevin Mitnick (center) and Kevin Poulsen …

    Wikipedia

  • 108Arson — Arsonists redirects here. For the hip hop band, see Arsonists (rap group). Torched redirects here. For the Michael Hedges album, see Torched (album) …

    Wikipedia

  • 109Computer security incident management — In the fields of computer security and information technology, computer security incident management involves the monitoring and detection of security events on a computer or computer network, and the execution of proper responses to those events …

    Wikipedia

  • 110wanton — Reckless, heedless, malicious; characterized by extreme recklessness or foolhardiness; recklessly disregardful of the rights or safety of others or of consequences. In re Wegner, C.C.A.I11., 88 F.2d 899, 902. Means undisciplined, unruly, marked… …

    Black's law dictionary