http://www.w3.org/ns/prov#value | - However, Brewer emphasised that attribution as to where the threats were coming from was a challenge, telling SC Magazine: ???If it was coming from a known source ??? and in some cases the particular buildings and centres are known ??? then you can block that IP range and use the telcos to block their communications.
|