Puts out his ideas, information, photos, etc., on the Internet, which can be accessed by any other person
Visits the Web site of another person and makes changes in the information posted thereon
Accesses another person’s computer and steals secret information stored therein
Accesses another computer and continuously exchanges information with it