This HTML5 document contains 70 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n22http://dbkwik.webdatacommons.org/resource/m5268hoCy0FopVdhvAYd7w==
n28http://dbkwik.webdatacommons.org/resource/BI_YMFsDHhAih-4d-JLKNQ==
n2http://dbkwik.webdatacommons.org/resource/dqt2k-4WYvgZVbLNhYD_dw==
n14http://dbkwik.webdatacommons.org/resource/a4VTW6x-2GC9dN_-rIs8Qw==
n26http://dbkwik.webdatacommons.org/resource/p1DrYG1tFBN8KuWe394T_A==
n20http://dbkwik.webdatacommons.org/resource/RiaMY-W7ua567zJeXjY1LA==
n40http://dbkwik.webdatacommons.org/resource/lH7jGvnaQln-XRszQjNcDw==
n17http://dbkwik.webdatacommons.org/resource/jZlK9PUrsPaaGggM-qN4Hg==
n31http://dbkwik.webdatacommons.org/resource/WeoR4rhgZ16Tiitl2E-wuw==
n44http://dbkwik.webdatacommons.org/resource/hNQvgUbWcGKjqxz7SzToxw==
dctermshttp://purl.org/dc/terms/
n18http://dbkwik.webdatacommons.org/resource/NSJnW8aCK18Kn0PoMsKzxg==
rdfshttp://www.w3.org/2000/01/rdf-schema#
n46http://dbkwik.webdatacommons.org/resource/uazuHg3wEfJ5Uid5iYR3Jw==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n47http://dbkwik.webdatacommons.org/resource/EBTk8fB32gpdlsr7xXF73Q==
n15http://dbkwik.webdatacommons.org/resource/FBDHD3NYLre4A0ULYYdn4w==
n35http://dbkwik.webdatacommons.org/resource/Lg8sFabhB9qoBN0aDQsk3A==
n21http://dbkwik.webdatacommons.org/resource/t-e05xMI536BcRrCVMz0gg==
xsdhhttp://www.w3.org/2001/XMLSchema#
n4http://dbkwik.webdatacommons.org/resource/Jk314uGfHMXeMCl5Nd6_pA==
n16http://dbkwik.webdatacommons.org/summonermaster/property/
n41http://dbkwik.webdatacommons.org/resource/TgOVbXtoSofCtrjpr1F5Hw==
n19http://dbkwik.webdatacommons.org/resource/KmAgqP5XdJL-MTZhNVL9oA==
n9http://dbkwik.webdatacommons.org/resource/cqarQmjnmdl16ephP9Ac1g==
n29http://dbkwik.webdatacommons.org/resource/Cteci1yq58wDC25geOK15A==
n23http://dbkwik.webdatacommons.org/resource/6GrQNxW5iGd3nuCZX5N1nQ==
n11http://dbkwik.webdatacommons.org/resource/LHmlkiYEExxlNAPOrP2-OA==
n7http://dbkwik.webdatacommons.org/resource/HbB_W8S-UC3yGSnTKx8iYw==
n25http://dbkwik.webdatacommons.org/resource/5oMz7ybZ1k0H8Xb571X24A==
n32http://dbkwik.webdatacommons.org/resource/-vXBIqpDg29-goAMcepS6A==
n10http://dbkwik.webdatacommons.org/resource/y7N6dOb_opo9zPXNFFfdtA==
n37http://dbkwik.webdatacommons.org/resource/OzwoJx_xmG--V78sHeiABQ==
n34http://dbkwik.webdatacommons.org/resource/haxBIdLi7eEV_V8NrJ62kg==
n13http://dbkwik.webdatacommons.org/resource/tZXr3DZHoeSkhY6LypVllw==
n36http://dbkwik.webdatacommons.org/resource/hMX_N7pKqQxYLqcMcDLSTA==
n42http://dbkwik.webdatacommons.org/resource/dPAZcem1i5gw1J9r_nZqFw==
n38http://dbkwik.webdatacommons.org/resource/ZwE4O3utshWv1Qc47xdU6Q==
n33http://dbkwik.webdatacommons.org/resource/Lyrx1K8AwMZgTjkN3NBN4Q==
n5http://dbkwik.webdatacommons.org/ontology/
n24http://dbkwik.webdatacommons.org/resource/yfk3LrCzz5-Q18OOC5Bqjw==
n43http://dbkwik.webdatacommons.org/resource/NeUSOUMmOzRLF40A7sulFw==
n27http://dbkwik.webdatacommons.org/malware/property/
n8http://dbkwik.webdatacommons.org/resource/dhn4Tc-C_Pnm-Sc8BHA5QQ==
n6http://dbkwik.webdatacommons.org/resource/u9CoJLveKa3hQjUy9NRJUg==
n30http://dbkwik.webdatacommons.org/resource/q9dpp4oPia4hPovftTQuKg==
n39http://dbkwik.webdatacommons.org/resource/6-cjk5__DeSAvRWeT6sf6w==
n45http://dbkwik.webdatacommons.org/resource/N2UqA4EdVgh5Gr8UUkItpw==
Subject Item
n2:
rdf:type
n18: n38: n46:
rdfs:label
Sample page Sample Page
rdfs:comment
this is a sample page created for testing purpose We had a reported issue whereby outbound calls were receiving a recording from AT&T saying ‘Thank you for accessing the AT&T network …’. The caller would be given an option to press a number and be transferred to an AT&T representative who would report that the call had been had a billing block on it and then they would transfer the caller to the intended party. asdaskdjasldjaskldkl askdkjalsdsfdsf This guide is for Source Editing Only Hint: To introduce a new section, type == before the title. For example "==Example==" (Source Mode Only) Hint: Most of MalwareInfobox fields are self explanatory, if you are not sure of any field do not fill it in! Formatting: {{MalwareInfobox |name = |image = |type = |creator = |date = , |origin = |pl = |platform = |filetype = |aka = |family = |fsize = |size = |cost = }} or is a that . ==Details== ==Aliases== ==Media== File Name Here ==Sources== , [ ] [Hint: Start with a brief introduction of the virus, but do not spoil the payload]
dcterms:subject
n13: n14: n21: n23: n30: n37:
n27:wikiPageUsesTemplate
n28: n29: n34: n40: n44: n45:
n47:
,
n9:
Malware Wiki
n8:
Win32
n19:
Alive
n35:
n33:
Linux
n22:
Malware Antivirus
n20:
Virus Antivirus
n41:
n11:
1.3
n16:wikiPageUsesTemplate
n17:
n25:
Deutch
n39:
n15:
HTML
n7:
CC-BY-SA
n43:
.HTML
n31:
HTML.Malware
n6:
1.2
n32:
C++
n4:
Malware Wiki
n36:
www.Antivirus.com
n26:
Wikia
n10:
Godzilla Gamer and Alles Sandro
n24:
2255255
n42:
2300000
n5:abstract
this is a sample page created for testing purpose We had a reported issue whereby outbound calls were receiving a recording from AT&T saying ‘Thank you for accessing the AT&T network …’. The caller would be given an option to press a number and be transferred to an AT&T representative who would report that the call had been had a billing block on it and then they would transfer the caller to the intended party. asdaskdjasldjaskldkl askdkjalsdsfdsf This guide is for Source Editing Only Hint: To introduce a new section, type == before the title. For example "==Example==" (Source Mode Only) Hint: Most of MalwareInfobox fields are self explanatory, if you are not sure of any field do not fill it in! Formatting: {{MalwareInfobox |name = |image = |type = |creator = |date = , |origin = |pl = |platform = |filetype = |aka = |family = |fsize = |size = |cost = }} or is a that . ==Details== ==Aliases== ==Media== File Name Here ==Sources== , [ ] Example Preview: <default>Sample Page</default> Type Subtype Creator(s) Date Place of Origin Source Language Platform File Type Aliases Family File Size Infection Size Infection Impact Reported Costs MD5 Hash SHA1 Hash CRC32 Hash HTML.Malware or Malware [Hint: Start with both technical name and common name, and put bold on both] is a self-replicating worm that spreads through retrievable domain names. It is part of the Malware Wiki family. [Hint: To do an internal link, put double brackets around the page name. For example CIH] [Hint: Start with a brief introduction of the virus, but do not spoil the payload]