In recent years this has been a very woolly term as defined in our Terms and Conditions: 2.3.4 you will not employ programs which consume excessive system resources, including but not limited to processor cycles and memory. It came to our attention (after adding a number of new security applications recently) that we would only… Read more »