42 Computer security consultancy; Computer consultation in the field of computer security; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security service, namely, hard drive erasure; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Accreditation services, namely, developing, evaluating, and testing standards for digital devices for the purpose of accreditation; Accreditation services, namely, setting and providing standards for digital devices for the purpose of accreditation; Accreditation services, namely, evaluating organizations to determine whether the organizations conform to an established standard; Advice relating to the design of computer hardware; Cloud computing featuring software for use in monitoring remote sensors and alarms; Computer disaster recovery planning; Computer forensic services; Computer hardware and software design; Computer monitoring service which tracks hardware performance and processes and sends out historical reports and alerts (quality control); Computer network configuration services; Computer network design for others; Computer network design and computer software design for the use of logical and physical security; Computer programming consultancy; Computer services, namely, encrypted data recovery services; Computer services, namely, remote management of the information technology (IT) systems of others; Computer services, namely, on-site management of information technology (IT) systems; Consulting services in the field of testing of electronic components and electronic systems; Data encryption and decoding services; Design and development of electronic data security systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of security systems and contingency planning for information systems; Development of voluntary standards for information security; Maintenance of computer software relating to computer security and prevention of computer risks; Providing a website featuring technology enabling users to remotely view, monitor, program, operate and control large and small appliances, electrical systems and security systems in homes, offices and vehicles; Rental of computers relating to computer security and prevention of computer risks; Research in the field of intelligence and security technology; Software development in the field of logical and physical security; Technology consultation in the field of logical and physical security; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risks