Some software is being developed in such a way that they are always Tethered to a server on the internet in order to function. If the server stops working, the program becomes obsolete. Unless the server's software is published in such a way that anybody can host it, this kind of Tethering is malicious.