1. Hacking financial/bank account-related information.
2. Stealing organizational/intellectual information.
3. Illegal monitoring of information owned by other users.
4. Illegal use/break of login and password of other users.
5. Causing intentional irritation to other users by means of damaging software and important information.