This HTML5 document contains 5 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n7http://dbkwik.webdatacommons.org/ontology/
dctermshttp://purl.org/dc/terms/
n4http://dbkwik.webdatacommons.org/resource/YCXPH3z2dbCiF8bueebk3g==
rdfshttp://www.w3.org/2000/01/rdf-schema#
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
xsdhhttp://www.w3.org/2001/XMLSchema#
n6http://dbkwik.webdatacommons.org/resource/6hHN-muilW-lUmjLB6nWpA==
n2http://dbkwik.webdatacommons.org/resource/hBZIaN5wALo6yL88RRKLJQ==
Subject Item
n2:
rdfs:label
VBMania
rdfs:comment
VBMania, is a computer worm that successfully attacked many Windows computers in 2010 when it was sent as a link inside an email message with the text "Here you have" in the subject line. The worm arrived in email inboxes on and after September 9, 2010 with the simple subject of "Here you have". The final extension of the link was hidden by default, leading unsuspecting users to think it was a mere PDF file. Upon opening the attachment, the worm sent a copy of itself to everyone in the Windows Address Book. This is the email the worm sends.
dcterms:subject
n4: n6:
n7:abstract
VBMania, is a computer worm that successfully attacked many Windows computers in 2010 when it was sent as a link inside an email message with the text "Here you have" in the subject line. The worm arrived in email inboxes on and after September 9, 2010 with the simple subject of "Here you have". The final extension of the link was hidden by default, leading unsuspecting users to think it was a mere PDF file. Upon opening the attachment, the worm sent a copy of itself to everyone in the Windows Address Book. This is the email the worm sends. Subject: Here you have Hello: This is The Document I told you about,you can find it Here. Please check it and reply as soon as possible. Cheers,