PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • You should follow the securinng SSH howto before configuring Fail2ban as most attacks on the system will be attempting to gain access to your system via SSH. Pay close attention to things such as not allowing root logins, max retry attempts, and use of ssh keys.
http://www.w3.org/ns/prov#wasQuotedFrom
  • centoshelp.org