| http://www.w3.org/ns/prov#value | - Just look at the time the computer was turned on and off for that day.The security log records events such as valid and invalid logon attempts, as well as events related to resource use such as creating, opening, or deleting files or other objects.
|