This HTML5 document contains 35 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n22http://dbkwik.webdatacommons.org/ontology/
n25http://dbkwik.webdatacommons.org/resource/Jn_bcXYYMo3shzT1TYYfzw==
dctermshttp://purl.org/dc/terms/
n26http://dbkwik.webdatacommons.org/resource/WeoR4rhgZ16Tiitl2E-wuw==
n35http://dbkwik.webdatacommons.org/resource/r7VFVcc_b9xmxaoJBAJ3IQ==
n21http://dbkwik.webdatacommons.org/resource/HpjKnmmi0SOeGjlbOevuXA==
n16http://dbkwik.webdatacommons.org/resource/fjhK2NtWd-DYQaiHs-iOZA==
n2http://dbkwik.webdatacommons.org/resource/vI6l3PlUi7efJjzeh3ce0Q==
n8http://dbkwik.webdatacommons.org/resource/-8mJVhZ4OC-pKkFNvxkIAg==
n7http://dbkwik.webdatacommons.org/resource/NeUSOUMmOzRLF40A7sulFw==
n24http://dbkwik.webdatacommons.org/resource/RBgCl4b_ak0UhIqP9NIdew==
rdfshttp://www.w3.org/2000/01/rdf-schema#
n13http://dbkwik.webdatacommons.org/malware/property/
n4http://dbkwik.webdatacommons.org/resource/0xZ5Ec0v473K8w3P1h_Nog==
n12http://dbkwik.webdatacommons.org/resource/y7N6dOb_opo9zPXNFFfdtA==
n14http://dbkwik.webdatacommons.org/resource/Cteci1yq58wDC25geOK15A==
n11http://dbkwik.webdatacommons.org/resource/rnga6qiBm4Rtiai6BDB8BA==
n30http://dbkwik.webdatacommons.org/resource/dhn4Tc-C_Pnm-Sc8BHA5QQ==
n23http://dbkwik.webdatacommons.org/resource/uazuHg3wEfJ5Uid5iYR3Jw==
n36http://dbkwik.webdatacommons.org/resource/yfk3LrCzz5-Q18OOC5Bqjw==
n27http://dbkwik.webdatacommons.org/resource/IctOJfNpe_kVRwfzKv6V9g==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n20http://dbkwik.webdatacommons.org/resource/EBTk8fB32gpdlsr7xXF73Q==
owlhttp://www.w3.org/2002/07/owl#
n19http://dbkwik.webdatacommons.org/resource/FBDHD3NYLre4A0ULYYdn4w==
n15http://dbkwik.webdatacommons.org/resource/cqarQmjnmdl16ephP9Ac1g==
n10http://dbkwik.webdatacommons.org/resource/IkyuwrJA0hosBHU5MUpQHA==
n31http://dbkwik.webdatacommons.org/resource/RiaMY-W7ua567zJeXjY1LA==
n37http://dbkwik.webdatacommons.org/resource/3QpRw4mH54TRBp6Zqy3erg==
n5http://dbkwik.webdatacommons.org/resource/TnRcsBeijb-I7dAyYmfI4g==
n33http://dbkwik.webdatacommons.org/resource/3s7u7VSgzsZU2HcaUdoshA==
n34http://dbkwik.webdatacommons.org/resource/o-2f_0jd6cLFxAichJBB1w==
xsdhhttp://www.w3.org/2001/XMLSchema#
n6http://dbkwik.webdatacommons.org/resource/m5268hoCy0FopVdhvAYd7w==
n28http://dbkwik.webdatacommons.org/resource/aZibEwLclHN4yE9r-MYlgQ==
dbrhttp://dbpedia.org/resource/
n9http://dbkwik.webdatacommons.org/resource/KHbu_BgqkHiwCd3vWfE0gA==
n32http://dbkwik.webdatacommons.org/resource/tCQycsWDw_L67MqDj_XEcQ==
Subject Item
n2:
rdf:type
n23:
rdfs:label
Lehigh
rdfs:comment
Lehigh is an early DOS virus that infects only COMMAND.COM. While it is a file virus, the fact that it only infects one particular file on each disk causes it to behave in a way similar to a boot sector virus. <default>Lehigh</default> Type Subtype Creator(s) Date Place of Origin Source Language Platform File Type Aliases Family File Size Infection Size Infection Impact Reported Costs MD5 Hash SHA1 Hash CRC32 Hash Lehigh is an early DOS virus that infects only COMMAND.COM. While it is a file virus, the fact that it only infects one particular file on each disk causes it to behave in a way similar to a boot sector virus.
owl:sameAs
dbr:Lehigh_Defense
dcterms:subject
n4: n5: n8: n9: n10: n11: n16: n21: n25: n27: n28: n32: n33: n34: n35: n37:
n13:wikiPageUsesTemplate
n14: n24:
n20:
1987-11-01
n15:
Bethlehem, PA, USA
n30:
DOS
n6:
Lehigh
n31:
Virus
n19:
Assembly
n7:
.COM
n26:
Virus.DOS.Lehigh
n12:
Unknown
n36:
555
n22:abstract
<default>Lehigh</default> Type Subtype Creator(s) Date Place of Origin Source Language Platform File Type Aliases Family File Size Infection Size Infection Impact Reported Costs MD5 Hash SHA1 Hash CRC32 Hash Lehigh is an early DOS virus that infects only COMMAND.COM. While it is a file virus, the fact that it only infects one particular file on each disk causes it to behave in a way similar to a boot sector virus. Lehigh is an early DOS virus that infects only COMMAND.COM. While it is a file virus, the fact that it only infects one particular file on each disk causes it to behave in a way similar to a boot sector virus.