9 Apparatus for recording, transmission or reproduction of sound or images; Blank magnetic data carriers in the nature of recording discs; compact discs and DVDs featuring computer software, namely, computer anti-virus software, computer security software, computer network security software, software for ensuring the security of electronic mails, software for reporting security vulnerabilities in other software, software for reporting bugs in other software, software for analysing security threats and vulnerabilities in other software and computer networks, software for recovering computer data and software for tracing the origin of computer viruses and spyware, software for identity security, software for use in analysis and reporting of firewall log data, software for detecting, blocking and intercepting malware and other threats to computer hardware and software, software for use in vulnerability scanning of networks, websites, computer hardware and other computer software; data processing equipment, computers, computer terminals, computer peripherals; Computer hardware; computer software, namely, computer anti-virus software, computer security software, computer network security software, software for ensuring the security of electronic mails, software for reporting security vulnerabilities in other software, software for reporting bugs in other software, software for analysing security threats and vulnerabilities in other software and computer networks, software for recovering computer data and software for tracing the origin of computer viruses and spyware, software for identity security, software for use in analysis and reporting of firewall log data, software for detecting, blocking and intercepting malware and other threats to computer hardware and software, software for use in vulnerability scanning of networks, websites, computer hardware and other computer software; alarms, namely, fire alarms, sound alarms and burglar alarms; computer memory devices; computer operating programs, recorded; computer peripheral devices; computer programs in the nature of downloadable software, namely, computer anti-virus software, computer security software, software for reporting security vulnerabilities in other software, software for reporting bugs in other software, software for analysing security threats and vulnerabilities in other software and computer networks, software for recovering computer data and software for tracing the origin of computer viruses and spyware; computer software, recorded, namely, computer anti-virus software, computer security software, software for reporting security vulnerabilities in other software, software for reporting bugs in other software, software for analysing security threats and vulnerabilities in other software and computer networks, software for recovering computer data and software for tracing the origin of computer viruses and spyware; computer network security software; computer security software; USB computer security keys; anti-spyware software; computer anti-virus software; software for ensuring the security of electronic mail; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for identity security, namely, software for authenticating user identification and software for detecting identity fraud; computer software for authentication and identity management information security; computer software for detecting identity fraud; computer software and firmware for the management, transmission, and storage of data and information; computer software for use in vulnerability scanning of networks, websites and electronic devices; sound recording, video recordings and data recordings in the nature of audio and video recording all featuring instructions of internet security, computer security, and computer virus protection information; software for detecting, eradicating and preventing computer viruses; software for data encryption; software for analysing and recovering data; software for computer system backup, data processing, data storage, file management and database management; pre-recorded computer programs for personal information management, database management software, character recognition software, telephony management software, electronic mail and messaging software, mobile telephone software, namely, mobile telephone anti-virus software, mobile telephone security software and mobile telephone operating software; database synchronization software; computer programs for accessing, browsing and searching online databases; computer software for the synchronization of data between a remote station or device and a fixed or remote station or device; Downloadable electronic publications in the nature of books, pamphlets, brochures, newsletters, journals, magazines and periodicals in the field of internet security, computer security and computer virus protection; Cyber security software in the nature of anti-spyware software, software for secure network operations and software for protecting personal details on the internet; software for reporting, monitoring, analysing and tracing computer viruses; computer software for recovery of computer data; computer software for warning of computer and internet security threats and viruses; computer software to enhance the capabilities of other computer software, mobile phone software, computer operating software, mobile phone operating software; software to analyse and monitor the security vulnerabilities of other software; computer software for testing vulnerability in computers and computer networks; computer software to allow users to reports bugs, viruses and security vulnerabilities in other software; computer software to allow users to provide feedback on other software; software to allow users to identify and report issues with other software