Sites that host application that is covertly downloaded to some consumer's equipment to gather info and watch person activity, and web sites that happen to be contaminated with destructive or malicious computer software, specially meant to harm, disrupt, attack or manipulate Laptop devices with no person's consent, such as virus or trojan horse.Web