42 Computer security consultancy; Internet security consultancy; data security consultancy; testing of security systems; computer security threat analysis for protecting data; design and development of electronic data security systems; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; development of security systems and contingency planning for information systems; rental of computers relating to computer security and prevention of computer risks; maintenance of computer software relating to computer security and prevention of computer risks; updating of computer software relating to computer security and prevention of computer risks design and development of virtual private network (VPN) operating software; traffic design integration; traffic planning services; design of traffic systems; developing customized software in the field of traffic and transportation management for others; architectural design services in the fields of traffic and transportation; design of traffic control equipment; engineering services in the fields of traffic and transportation; transportation and traffic planning services; traffic and transportation engineering; cross-platform conversion of digital content into other forms of digital content; providing electronic verification of on-line orders of digital content and generating electronic permission codes which then allow users to access said digital content; hosting the digital audio and video content of others for the purpose of enabling hotel, inn, and other lodging establishment guests to download the content on a pay per view basis; providing customer-defined generated content and content of others automatically selected and customized based on the known or estimated geographical location of an Internet, mobile telephone or other wired or wireless digital network based customer; software as a service (SAAS) services featuring software for use in database management, for service desk management and for accounting; cloud computing featuring software for use in database management, for service desk management, for accounting, for use as a spreadsheet and for word processing; application service provider (ASP) featuring software for use in database management, for service desk management, for accounting, for use as a spreadsheet and for word processing; application service provider, namely, hosting, managing, developing, and maintaining applications, software, and web sites, in the fields of personal productivity, wireless communication, mobile information access, and remote data management for wireless delivery of content to handheld computers, laptops and mobile electronic devices; software as a service (SAAS) services featuring software for use in database management, for service desk management, for accounting, for use as a spreadsheet and for word processing; providing temporary use of on-line non-downloadable software and applications for use in database management, for service desk management, for accounting, for use as a spreadsheet and for word processing; providing temporary use of a web-based software application for use in database management, for service desk management, for accounting, for use as a spreadsheet and for word processing; platform as a service (PAAS) featuring computer software platforms for use in database management, for service desk management, for accounting, for use as a spreadsheet and for word processing; computer virus protection services; computer security consultancy in the field of computer virus scanning software; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; online computer services, namely, providing spam filtering services to protect websites and online applications from receiving unsolicited messages; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials