| http://www.w3.org/ns/prov#value | - The implication is that an intruder can execute this attack from a dial-up connection against a machine on a very fast network. (This is a good example of an asymmetric attack.) Using Your Own Resources Against You An intruder can also use your own resources against you in unexpected ways.
|