42 Design and development of computer hardware and software; authentication services for electronic documents and e-mail; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network; rental of computer network devices; providing computer network services; development, integration and configuration of computer systems to support issuance and management of digital certificates; digital certificate and digital signature verification services (electronic cryptology services); computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, management, digital certificate issuance, verification and management, and enterprise software integration; security verification of computer network firewalls, servers and other network devices from unauthorized access; providing electronic data storage services; hosting of online database featuring information relating to computers, computer hardware, computer software, computer networks, computer-related services, data storage management, enterprise information management, and online analytical processing (OLAP); computer services, namely, hosting a computer software platform that bridges Internet and telephony services and enables user to communicate and transmit information across multiple networks via mobile phones, personal computers, PDAs and other personal electronic devices; network and Internet security services; computer services, namely, providing information concerning the encryption and authentication of electronic data; data encryption and data decryption services for Internet anonymity, prevention and destruction of digital traces, and for securing and protecting computer systems, networks, data and applications; creation, design, maintenance and update of computer software in the fields of data encryption and data decryption, Internet anonymity and prevention and destruction of digital traces and securing and protecting computer systems, networks, data and applications; data security services (firewalls)