Web-sites that host application that is definitely covertly downloaded to a user's device to collect information and keep track of person action, and websites which can be contaminated with destructive or malicious application, specially designed to problems, disrupt, assault or manipulate Computer system techniques with no user's consent, for inst