About: Ghost hacking   Sponge Permalink

An Entity of Type : owl:Thing, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

Ghost hacking is a fictional activity depicted in Ghost in the Shell, whereby a person -- or machine -- uses similar technologies to hacking a computer, in order to gain direct access to the conscious mind of another person. In the Ghost in the Shell universe, people have ways in which they can connect their brain directly to diverse networks. While people generally use a firewall, a good hacker or cracker can bypass it and gain direct access to the mind of the person in question. In most cases, victims do not know they have been ghost hacked unless told by an outside source.

AttributesValues
rdfs:label
  • Ghost hacking
rdfs:comment
  • Ghost hacking is a fictional activity depicted in Ghost in the Shell, whereby a person -- or machine -- uses similar technologies to hacking a computer, in order to gain direct access to the conscious mind of another person. In the Ghost in the Shell universe, people have ways in which they can connect their brain directly to diverse networks. While people generally use a firewall, a good hacker or cracker can bypass it and gain direct access to the mind of the person in question. In most cases, victims do not know they have been ghost hacked unless told by an outside source.
dcterms:subject
dbkwik:transhumani...iPageUsesTemplate
abstract
  • Ghost hacking is a fictional activity depicted in Ghost in the Shell, whereby a person -- or machine -- uses similar technologies to hacking a computer, in order to gain direct access to the conscious mind of another person. In the Ghost in the Shell universe, people have ways in which they can connect their brain directly to diverse networks. While people generally use a firewall, a good hacker or cracker can bypass it and gain direct access to the mind of the person in question. A person who has ghost hacks can do a diverse number of actions with a victim. Victims can have their senses tapped into by a ghost hacker, allowing the hacker to know the information the victim's physical senses are relaying, while a more extreme hacker can overwrite the victim's memories and thoughts to completely manipulate their actions. In most cases, victims do not know they have been ghost hacked unless told by an outside source.
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software