42 Computer security consultancy in the field of ethical hacking, security risks, application security, wireless penetrating, forensic incident response and threat mitigation; Development of security systems and contingency planning for information systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the web sites of others; Consulting services for others in the field of design, planning, and implementation project management of computer, information, data privacy and security; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Updating of computer software relating to computer security and prevention of computer risks; Computer disaster recovery planning; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security consultancy; Internet security consultancy; Data security consultancy; Computer security threat analysis for protecting data; Testing of computers; Testing of computer software; Testing of security systems; Testing of computer hardware