About: Hacked by a Pirate   Sponge Permalink

An Entity of Type : owl:Thing, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

Whenever a character, be it the Asian and Nerdy hero or the computer genius villain, decides to hack into the opponent's computer and mess up with his plans, he'll never stop at just making the computer malfunction. You've got to do it with style. Named after the fact that Skull and Crossbones happen to be the Pirate's symbol of choice. Note that the trope is rarely, if ever, performed by an actual pirate, since they usually try not to be noticed. Examples of Hacked by a Pirate include: and

AttributesValues
rdfs:label
  • Hacked by a Pirate
rdfs:comment
  • Whenever a character, be it the Asian and Nerdy hero or the computer genius villain, decides to hack into the opponent's computer and mess up with his plans, he'll never stop at just making the computer malfunction. You've got to do it with style. Named after the fact that Skull and Crossbones happen to be the Pirate's symbol of choice. Note that the trope is rarely, if ever, performed by an actual pirate, since they usually try not to be noticed. Examples of Hacked by a Pirate include: and
dcterms:subject
dbkwik:all-the-tro...iPageUsesTemplate
dbkwik:allthetrope...iPageUsesTemplate
abstract
  • Whenever a character, be it the Asian and Nerdy hero or the computer genius villain, decides to hack into the opponent's computer and mess up with his plans, he'll never stop at just making the computer malfunction. You've got to do it with style. And so, a Skull and Crossbones image shall take the entire screen of the hacked computer, possibly followed by the voice of the hacker laughing in the background. Alternatively, an 8Bit image of the character doing the hacking, or his logo, or perhaps a mix of the above, shall appear on the screen, such as a Skull and Crossbones, only the skull is wearing the very same hat the hacker wears. Named after the fact that Skull and Crossbones happen to be the Pirate's symbol of choice. Note that the trope is rarely, if ever, performed by an actual pirate, since they usually try not to be noticed. Examples of Hacked by a Pirate include: and * The lead character of Bloody Monday Fujimaru, known as 'Falcon', always leaves his personal symbol of a diving falcon at the screen of every computer he visits as a calling card. * Radical Edward from Cowboy Bebop tends to do this. Although Ed's more into smiley faces and other sillyness. * In Yu-Gi-Oh!, Pegasus does this by showing his favorite cartoon rabbit character when he counter-hacks Kaiba trying to hack into his system.
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software