| http://www.w3.org/ns/prov#value | - Various methods are used to gain access to your system, often for the purpose of harvesting sensitive information, such as passwords, bank account or credit card numbers and/or making changes to the system that render it difficult to even use it.
|