d. Remote Access Technologies.
e. Font Components.
f. Icons, images and sounds.
4. POTENTIALLY UNWANTED SOFTWARE.