OpenLink Software

Usage stats on Hacked by a Pirate

 Permalink

an Entity in Data Space: 134.155.108.49:8890

Whenever a character, be it the Asian and Nerdy hero or the computer genius villain, decides to hack into the opponent's computer and mess up with his plans, he'll never stop at just making the computer malfunction. You've got to do it with style. Named after the fact that Skull and Crossbones happen to be the Pirate's symbol of choice. Note that the trope is rarely, if ever, performed by an actual pirate, since they usually try not to be noticed. Examples of Hacked by a Pirate include: and

Graph IRICount
http://dbkwik.webdatacommons.org21
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] This material is Open Knowledge Creative Commons License Valid XHTML + RDFa
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Copyright © 2009-2012 OpenLink Software