42 processes related to the recovery or attempted recovery of lost or stolen computer hardware, software based data encryption and network distributed firewall protection of computer hardware, asset tracking and management and the provision of a warranty for personal computer hardware covering accidental breakage or damage, spillage and/or theft or loss