| http://www.w3.org/ns/prov#value | - The person was in line and connects the iPod to your computer without taking into account that not doing anything other than access to a storage device that is also likely to host malicious code.The removable storage devices that connect via USB with a high rate of effectiveness in the dissemination of malicious code, ie not just speaking about USB, speaking of iPods, mp3 players, mp4, cameras, ca
|