| http://www.w3.org/ns/prov#value | - Spoofing, eavesdropping, sniffing, spamming, breaking passwords, harassment, fraud, forgery, imposturing, electronic trespassing, tampering, hacking, nuking, system contamination including without limitation use of viruses, worms and Trojan horses causing unauthorized, damaging or harmful access and/or retrieval of information and data on your computer and other forms of activity that may even b
|