42 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of data protection; Computer security service, namely, hard drive erasure; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized access to user accounts, websites, online software, computers, smartphones, computer hardware and data; Computer security services, namely, restricting unauthorized network access by unauthorized and non-credentialed users; Computer security threat analysis for protecting data; Data security consultancy; Data encryption services for providing security and anonymity for electronically transmitted credit card transactions; Design and development of electronic data security systems; Design and development of home security systems; Development of security systems and contingency planning for information systems; Engineering and system analysis in the field of home security systems; Hosting an online community website featuring shared communications between community members interested in personal and small business computer information security; Internet security consultancy; Maintenance of computer software relating to computer security and prevention of computer risks; Providing a website featuring technology enabling users to remotely view, monitor, program, operate and control large and small appliances, electrical systems and security systems in homes, offices and vehicles; Providing a website that features technology that enables the secure exchange of information by users; Providing technology information updates for home security systems via the global computer network; Recording software protection programs and security programs onto magnetic media; Rental of computers relating to computer security and prevention of computer risks; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risks