Erratum - Industrie Canada
Erratum - Industrie Canada
Erratum - Industrie Canada
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Vol. 55, No. 2801 TRADE-MARKS JOURNAL DES MARQUES DE COMMERCE<br />
threats by analyzing the behaviour programs to detect all types of<br />
malware, namely, viruses, trojans and worms, security risks,<br />
spyware, dialers, jokes, adware, spybots, keyloggers, without the<br />
need for a previous identification of that threat or having to depend<br />
on software updates, and protection to block programs that spy on<br />
users’ Internet movements to prevent spamming or theft of<br />
confidential information; computer programming relating to<br />
computer security, prevention of computer risks, antivirus and/or<br />
antimalware, namely, protection through proactive detection of<br />
threats by analyzing the behaviour programs to detect all types of<br />
malware, namely, viruses, trojans and worms, security risks,<br />
spyware, dialers, jokes, adware, spybots, keyloggers, without the<br />
need for a previous identification of that threat or having to depend<br />
on software updates, and protection to block programs that spy on<br />
users’ Internet movements to prevent spamming or theft of<br />
confidential information; design of computer software relating to<br />
computer security, prevention of computer risks, antivirus and/or<br />
antimalware, namely, protection through proactive detection of<br />
threats by analyzing the behaviour programs to detect all types of<br />
malware, namely, viruses, trojans and worms, security risks,<br />
spyware, dialers, jokes, adware, spybots, keyloggers, without the<br />
need for a previous identification of that threat or having to depend<br />
on software updates, and protection to block programs that spy on<br />
users’ Internet movements to prevent spamming or theft of<br />
confidential information; installation of computer software relating<br />
to computer security, prevention of computer risks, antivirus and/<br />
or antimalware, namely, protection through proactive detection of<br />
threats by analyzing the behaviour programs to detect all types of<br />
malware, namely, viruses, trojans and worms, security risks,<br />
spyware, dialers, jokes, adware, spybots, keyloggers, without the<br />
need for a previous identification of that threat or having to depend<br />
on software updates, and protection to block programs that spy on<br />
users’ Internet movements to prevent spamming or theft of<br />
confidential information; rental of computer software relating to<br />
computer security, prevention of computer risks, antivirus and/or<br />
antimalware, namely, protection through proactive detection of<br />
threats by analyzing the behaviour programs to detect all types of<br />
malware, namely, viruses, trojans and worms, security risks,<br />
spyware, dialers, jokes, adware, spybots, keyloggers, without the<br />
need for a previous identification of that threat or having to depend<br />
on software updates, and protection to block programs that spy on<br />
users’ Internet movements to prevent spamming or theft of<br />
confidential information; granting of computer software licenses<br />
relating to computer security, prevention of computer risks,<br />
antivirus and/or antimalware, namely, protection through proactive<br />
detection of threats by analyzing the behaviour programs to detect<br />
all types of malware, namely, viruses, trojans and worms, security<br />
risks, spyware, dialers, jokes, adware, spybots, keyloggers,<br />
without the need for a previous identification of that threat or<br />
having to depend on software updates, and protection to block<br />
programs that spy on users’ Internet movements to prevent<br />
spamming or theft of confidential information; maintenance of<br />
computer software relating to computer security, prevention of<br />
computer risks, antivirus and/or antimalware, namely, protection<br />
through proactive detection of threats by analyzing the behaviour<br />
programs to detect all types of malware, namely, viruses, trojans<br />
and worms, security risks, spyware, dialers, jokes, adware,<br />
spybots, keyloggers, without the need for a previous identification<br />
of that threat or having to depend on software updates, and<br />
protection to block programs that spy on users’ Internet<br />
movements to prevent spamming or theft of confidential<br />
information; updating of computer software relating to computer<br />
security, prevention of computer risks, antivirus and/or<br />
antimalware, namely, protection through proactive detection of<br />
threats by analyzing the behaviour programs to detect all types of<br />
malware, namely, viruses, trojans and worms, security risks,<br />
spyware, dialers, jokes, adware, spybots, keyloggers, without the<br />
need for a previous identification of that threat or having to depend<br />
on software updates, and protection to block programs that spy on<br />
users’ Internet movements to prevent spamming or theft of<br />
confidential information; duplication of computer programs in<br />
relation to computer security, prevention of computer risks,<br />
antivirus and/or antimalware, namely, protection through proactive<br />
detection of threats by analyzing the behaviour programs to detect<br />
all types of malware, namely, viruses, trojans and worms, security<br />
risks, spyware, dialers, jokes, adware, spybots, keyloggers,<br />
without the need for a previous identification of that threat or<br />
having to depend on software updates, and protection to block<br />
programs that spy on users’ Internet movements to prevent<br />
spamming or theft of confidential information; conversion of data<br />
or documents from physical to electronic media in relation to<br />
computer security, prevention of computer risks, antivirus and/or<br />
antimalware, namely, protection through proactive detection of<br />
threats by analyzing the behaviour programs to detect all types of<br />
malware, namely, viruses, trojans and worms, security risks,<br />
spyware, dialers, jokes, adware, spybots, keyloggers, without the<br />
need for a previous identification of that threat or having to depend<br />
on software updates, and protection to block programs that spy on<br />
users’ Internet movements to prevent spamming or theft of<br />
confidential information; conversion of computer programs and<br />
data in relation to computer security, prevention of computer risks,<br />
antivirus and/or antimalware, namely, protection through proactive<br />
detection of threats by analyzing the behaviour programs to detect<br />
all types of malware, namely, viruses, trojans and worms, security<br />
risks, spyware, dialers, jokes, adware, spybots, keyloggers,<br />
without the need for a previous identification of that threat or<br />
having to depend on software updates, and protection to block<br />
programs that spy on users’ Internet movements to prevent<br />
spamming or theft of confidential information; recovery of<br />
computer data in relation to computer security, prevention of<br />
computer risks, antivirus and/or antimalware, namely, protection<br />
through proactive detection of threats by analyzing the behaviour<br />
programs to detect all types of malware, namely, viruses, trojans<br />
and worms, security risks, spyware, dialers, jokes, adware,<br />
spybots, keyloggers, without the need for a previous identification<br />
of that threat or having to depend on software updates, and<br />
protection to block programs that spy on users’ Internet<br />
movements to prevent spamming or theft of confidential<br />
information; creating and maintaining web sites for others in<br />
relation to computer security, prevention of computer risks,<br />
antivirus and/or antimalware, namely, protection through proactive<br />
detection of threats by analyzing the behaviour programs to detect<br />
all types of malware, namely, viruses, trojans and worms, security<br />
risks, spyware, dialers, jokes, adware, spybots, keyloggers,<br />
without the need for a previous identification of that threat or<br />
having to depend on software updates, and protection to block<br />
programs that spy on users’ Internet movements to prevent<br />
spamming or theft of confidential information; hosting computer<br />
02 juillet 2008 32 July 2, 2008