Sites that host software program that is covertly downloaded to the person's equipment to gather data and keep an eye on user exercise, and internet sites which might be infected with damaging or malicious software, precisely built to problems, disrupt, attack or manipulate computer devices without the person's consent, which include virus or troja