9
Computer software; computer software for providing network, internet, and computer security; computer software for providing online identity protection, privacy control, and parental control; computer software for providing intrusion detection and prevention; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; computer software for use in the monitoring and control of computer and online activity; computer software for providing online transaction security; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer maintenance software; computer software for the back-up, storage, restoration and recovery of data, folders, and files; computer software and downloadable computer software, namely, utility software; computer software for providing software updates; user manuals and instructional guides supplied with all of the foregoing; computer hardware and peripherals
16
Reference, user, technical, and instructional manuals and data sheets for computer software users; computer software and security manuals; newsletters featuring information about computer software and computer software security; magazines, newspapers, books, and pamphlets; labels and holographic labels; paper, cardboard, and articles from these materials
35
Monitoring consumer credit reports and providing an alert as to any changes therein; arranging and conducting exhibitions relating to computer software and security issues
42
Computer consultation; computer consultation in the field of computer security; computer diagnostic services; computer services, namely, data recovery services; technical support services, namely, troubleshooting of computer hardware and software problems; technical support services, namely, providing back-up computer programs and facilities; updating of computer software for others; computer virus protection services; computer software installation services; computer programming; network and Internet security services; technical consultation in the field of computer software installation and maintenance; consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; development, updating and maintenance of software and databases; providing information in the field of network and Internet security; providing technical information in the field of computer software applications
45
Monitoring of computer systems for security purposes; providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks; providing information in the fields of computer and internet security, preventing computer threats, computer hardware and software applications in security; identity theft protection services, namely, fraud prevention in the form of personal and financial information monitoring