This HTML5 document contains 4 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
dbpedia-owlhttp://dbpedia.org/ontology/
foafhttp://xmlns.com/foaf/0.1/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n4http://commons.wikimedia.org/wiki/Special:FilePath/Stering.
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n6http://commons.wikimedia.org/wiki/Special:FilePath/Stering.jpg?width=
n2http://dbpedia.org/resource/Hacker_(computer_security)
xsdhhttp://www.w3.org/2001/XMLSchema#
dbpediahttp://dbpedia.org/resource/
Subject Item
n2:
rdfs:comment
In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge, enjoyment, or to evaluate those weaknesses to assist in removing them.
rdfs:seeAlso
dbpedia:List_of_fictional_hackers
foaf:depiction
n4:jpg
dbpedia-owl:thumbnail
n6:300