9
Downloadable computer software for computer and network security; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; computer software; downloadable electronic publications and white papers; technical documentation manuals in the fields of computer hardware and software security, all being recorded electronically or optically; videocasts and podcasts; data, documents, information, video, sound, text and other media or multi-media, all being electronically recorded or downloadable from the Internet or other communications networks; computer hardware; flash drives
42
Computer consultation; consulting in the field of information technology; computer consultation in the field of computer and network security; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring software in the field of computer and network security; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy, namely, developing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies; cloud computing featuring software for use in computer and network security; cloud computing services in the field of computer and network security; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; implementing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies, namely, identifying malware on computer systems, identification the source and genealogy of malware, and identifying the objectives of computer system attackers; computer systems analysis; monitoring of computer systems for security purposes; provision of systems for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer network and Internet security services; computer consultation; computer consultation in the field of computer security; computer diagnostic services; technical support services, namely, troubleshooting of computer hardware and software problems; technical support services, namely, providing back-up computer programs and facilities; computer virus protection services; computer software installation services; computer programming; computer software design for others; technical consultation in the field of computer software installation and maintenance; consulting services in the field of design, selection, implementation and use of computer hardware and software systems; development, updating and maintenance of software for networks and standalone computers in the fields of security, database management, and anti-virus protection and monitoring security systems; providing information in the field of network and Internet security; providing technical information in the field of computer software applications; application service provider services; remote or on-site monitoring of computer systems; monitoring the computer systems of others and providing back-up computer programs and facilities; security verification of computer network firewalls, servers and other network devices from unauthorized access; forensic advice relating to attacks on computer systems and networks; implementing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies, namely, computer security assurance, administration of digital keys and digital certificates, providing fraud detection services for electronic funds transfer, and credit and debit card and electronic check transactions via a global computer network; provision of information, and advisory and consultancy services, all relating to the aforesaid including such services provided on-line or via the Internet
45
Litigation support services; licensing of technology, source code, computer software and other intellectual property; licensing of computer software for the protection of computers, computer systems, computer networks and internet websites against attacks from computer viruses, hackers, tampering, unauthorized intrusion and unauthorized manipulation of data; provision of information, and advisory and consultancy services, all relating to the aforesaid including such services provided on-line or via the Internet