42 Computer security service, namely, hard drive erasure; Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized access to data, systems, services, or networks; Computer security services, namely, restricting unauthorized network access by token, password, or physical access; Computer security threat analysis for protecting data; Data encryption services for providing security and anonymity for electronically transmitted credit card transactions; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of software for secure network operations; Maintenance of computer software relating to computer security and prevention of computer risks; Providing a secure electronic online system featuring technology which allows multi-factor authentication based on facial match; Providing a secured-access, members only website featuring technology that gives members the ability to process financial transactions based on facial recognition; Providing a website featuring technology enabling users to remotely view, monitor, program, operate and control large and small appliances, electrical systems and security systems in homes, offices and vehicles; Providing a website that features technology that enables the secure exchange of information by users; Recording software protection programs and security programs onto magnetic media