This HTML5 document contains 90 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n53http://dbkwik.webdatacommons.org/resource/CdKMxFfmJCrx1tMQ2ZFl1w==
n21http://dbkwik.webdatacommons.org/marvel-cinematicuniverse/property/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n9http://dbkwik.webdatacommons.org/resource/IWxxRfWtNmUnUJ4FuToVcg==
n46http://dbkwik.webdatacommons.org/resource/i3q4r4EocVv-xaDtTXbIoA==
n23http://dbkwik.webdatacommons.org/resource/CGjjmqpYyUKHqHGJHG4I8Q==
n57http://dbkwik.webdatacommons.org/resource/fEdlfxhrmLslMq8ckygi9w==
n85http://dbkwik.webdatacommons.org/resource/ZelGYdwUlq1dFNm_bMoAEA==
n37http://dbkwik.webdatacommons.org/resource/yMr3chy2mEtEilSD-7ibjA==
n90http://dbkwik.webdatacommons.org/resource/Pqv16rRY2mX1evSPgXcqkQ==
n63http://dbkwik.webdatacommons.org/resource/nvrr4TEdQSBadSoptuPCJA==
n36http://dbkwik.webdatacommons.org/resource/D6axA94VJWKtRa-q7-jFhA==
n10http://dbkwik.webdatacommons.org/resource/KmAgqP5XdJL-MTZhNVL9oA==
n50http://dbkwik.webdatacommons.org/resource/OmgsP0IHlBaftCEfkxX3AA==
n74http://dbkwik.webdatacommons.org/resource/9BFFfHT_FDaAurhoSlA-8g==
n44http://dbkwik.webdatacommons.org/resource/n5enqGnEuF4M1aUI6WMRfg==
n84http://dbkwik.webdatacommons.org/resource/6UXRVQVLqTt8joKN2Ln4vQ==
n89http://dbkwik.webdatacommons.org/resource/wE9StcIyEFLafoMqy4g2Kw==
n68http://dbkwik.webdatacommons.org/resource/11KTi0y9pGoRs6NE9LTgaQ==
n17http://dbkwik.webdatacommons.org/openra-red-alert/property/
n61http://dbkwik.webdatacommons.org/resource/ORIITCOMfL_pMd0m50Rj1w==
n67http://dbkwik.webdatacommons.org/resource/A8ZoyN9Hnc_Hzu5NuA7Z4g==
n24http://dbkwik.webdatacommons.org/resource/q5jHY3Qk1gG_mBN7RUVvZw==
n39http://dbkwik.webdatacommons.org/resource/ZZyH_BBi7Fej5Gbw0BJ8Xg==
xsdhhttp://www.w3.org/2001/XMLSchema#
n69http://dbkwik.webdatacommons.org/resource/IGRsaJuxZh3HrrZDCVMU8Q==
n43http://dbkwik.webdatacommons.org/resource/XSlvfrL64os5cvRUwJMMRQ==
n30http://dbkwik.webdatacommons.org/resource/x-ZAdT_XdIcmS5C_jD9GPQ==
n29http://dbkwik.webdatacommons.org/resource/a5Nv8cmRwrzqOp06N2ECGQ==
n22http://dbkwik.webdatacommons.org/resource/SU5rUJ8fvYotjxbNUSEV_Q==
n41http://dbkwik.webdatacommons.org/resource/Gc00nhRnzLYluAAwKGak7w==
n48http://dbkwik.webdatacommons.org/resource/bJ-Vz6F-xWGKCI25K1AWxA==
n95http://dbkwik.webdatacommons.org/resource/S0-ICOHune6DyKxzL1oeoQ==
n4http://dbkwik.webdatacommons.org/resource/sTOegF_NHJLZRBd34iEv4A==
n60http://dbkwik.webdatacommons.org/resource/IaEdB8HWLD1JKSt45cQFRg==
n64http://dbkwik.webdatacommons.org/resource/ErBh3UZ6ZBSG4KbQXIemaQ==
n75http://dbkwik.webdatacommons.org/resource/kuSfuSQ2h_QvR0NIpPGiFw==
n15http://dbkwik.webdatacommons.org/resource/VzgE0_nD03QcZgIr7EHU4w==
n42http://dbkwik.webdatacommons.org/marvelcinematicuniverse/property/
n52http://dbkwik.webdatacommons.org/resource/qiEskEzxMs-iTn3unyIntA==
n73http://dbkwik.webdatacommons.org/resource/OaAjqCH6-uhbzPif0VU65Q==
n58http://dbkwik.webdatacommons.org/resource/m5268hoCy0FopVdhvAYd7w==
n65http://dbkwik.webdatacommons.org/resource/r4KIiAwMqTJCgIkNL0nz-w==
n27http://dbkwik.webdatacommons.org/resource/sgJ-Ir4NW3NRGOFZb8bQXQ==
n14http://dbkwik.webdatacommons.org/cnc/property/
n20http://dbkwik.webdatacommons.org/resource/D_s2Mdxh92-T-niZXxJyXg==
n96http://dbkwik.webdatacommons.org/resource/ZmE9lffTDjKhzkRKy-XrvA==
dctermshttp://purl.org/dc/terms/
n28http://dbkwik.webdatacommons.org/resource/H0WNbq2aCScF2zGJXVrjdg==
n35http://dbkwik.webdatacommons.org/resource/ZX8AUB6FwRrBERJoRvLCMw==
n16http://dbkwik.webdatacommons.org/resource/fm2Yo8icFkUSY_3o8np5xw==
n26http://dbkwik.webdatacommons.org/resource/zRyRanRx3VvwzZJ5L7PRNA==
n91http://dbkwik.webdatacommons.org/resource/HIBOF1ZW6AeDFh-BUci-MA==
n72http://dbkwik.webdatacommons.org/resource/keaszW5_wtz5HLkfOwq90g==
n71http://dbkwik.webdatacommons.org/resource/hnw2bee_rpjvVGEfZ9dLeA==
n88http://dbkwik.webdatacommons.org/resource/mBy7CxI-hWztLo5VjyXEbg==
n81http://dbkwik.webdatacommons.org/resource/EBTk8fB32gpdlsr7xXF73Q==
n94http://dbkwik.webdatacommons.org/resource/u9CoJLveKa3hQjUy9NRJUg==
n8http://dbkwik.webdatacommons.org/resource/xXzUFMcRUxUq4QEBWUJmJQ==
n62http://dbkwik.webdatacommons.org/resource/9ftScRzS0tgKmSfJgIMEhA==
n76http://dbkwik.webdatacommons.org/resource/y7N6dOb_opo9zPXNFFfdtA==
n31http://dbkwik.webdatacommons.org/resource/ROKJ3GmSublBh4q4VjzPpw==
n55http://dbkwik.webdatacommons.org/resource/7KEzN54DUZVKDcV_oeS9nQ==
n3http://dbkwik.webdatacommons.org/marvelcinematic-universe/property/
n93http://dbkwik.webdatacommons.org/resource/c6eUhp3VqjB02eOYT8jZXA==
n40http://dbkwik.webdatacommons.org/crystalhall/property/
n78http://dbkwik.webdatacommons.org/resource/O9u8iajeC2WZdNs3DpGzOQ==
n25http://dbkwik.webdatacommons.org/resource/rR6Wl8vDpTYjWI9GvZoyIQ==
rdfshttp://www.w3.org/2000/01/rdf-schema#
n38http://dbkwik.webdatacommons.org/resource/WJqrhvHGbzTIQFczdALkyw==
n86http://dbkwik.webdatacommons.org/resource/ouvTuicjVeNtTcwQ5hVQKQ==
n33http://dbkwik.webdatacommons.org/resource/Ak6F-E4ezEns54raWZVQ8Q==
n66http://dbkwik.webdatacommons.org/resource/nele0osPDl7TUcX9w6NAOA==
n49http://dbkwik.webdatacommons.org/resource/eYeuiCqGfYEcQD98Bxhi8g==
n32http://dbkwik.webdatacommons.org/resource/qrwCo9cZiT1p0KATv1I8RA==
n51http://dbkwik.webdatacommons.org/resource/a4-t1lMjoAWxSWyVWeUlMA==
n54http://dbkwik.webdatacommons.org/resource/ssJgsza_7yHe2wNLQDIySg==
n92http://dbkwik.webdatacommons.org/resource/UT7ZaDcizxxAtX3ZWrYD2A==
n7http://dbkwik.webdatacommons.org/ontology/
n34http://dbkwik.webdatacommons.org/resource/amhw0LdBISuC4R6feobT8A==
n56http://dbkwik.webdatacommons.org/resource/VriU3aNqCIdq34VJGTmx9w==
n87http://dbkwik.webdatacommons.org/resource/JOSCvTkkrIhg2BLGcNyuMA==
n47http://dbkwik.webdatacommons.org/resource/PPtEcvpqmSGTimLmXlEbOA==
n19http://dbkwik.webdatacommons.org/resource/8pB_IlA-oeVE59uYUgjFPA==
n2http://dbkwik.webdatacommons.org/resource/DBpWyf-aitpq7bI1oxhsFw==
n80http://dbkwik.webdatacommons.org/resource/lRsJlnKvxKtIxGpHmd_pZA==
n70http://dbkwik.webdatacommons.org/muc/property/
n79http://dbkwik.webdatacommons.org/resource/DooeWY3jTmidxnBhjm6ndA==
n13http://dbkwik.webdatacommons.org/resource/edG7kjyVML39P0e54PHslQ==
n83http://dbkwik.webdatacommons.org/resource/ta7BQAOx8qZeu-rRy4sD_Q==
n6http://dbkwik.webdatacommons.org/resource/7HihbfT5liRif6H_wq4w4Q==
n45http://dbkwik.webdatacommons.org/resource/oqE7w9NP3C8HdgAzNP6VtA==
n59http://dbkwik.webdatacommons.org/resource/BqD4lAoL3p2_Z7RxotzzrQ==
n11http://dbkwik.webdatacommons.org/resource/PtPtmaOi0mMNr6z_4a00sA==
n82http://dbkwik.webdatacommons.org/marvel/property/
n18http://dbkwik.webdatacommons.org/resource/bW6-08iUHa1yx0h0DhH8VQ==
n77http://dbkwik.webdatacommons.org/resource/POspfbR2bJjhcP8MG-AXcw==
Subject Item
n55:
n54:
n2:
Subject Item
n2:
rdf:type
n96:
rdfs:label
Hijacker
rdfs:comment
Hijacker is a vehicle hacking upgrade in Watch Dogs 2. It allows the player to hack vehicles' electric locks instead of lockpicking, so the player will not attract any attention when stealing a vehicle. Without this upgrade, the player will just pick the lock of a vehicle, causing its alarms to go off, which will result in a heat level. This upgrade costs 4 Research Points and requires the previous hack, Vehicle Directional Hack, to be unlocked. It unlocks Chopper Retreat Exploit. Hijacker is the seventeenth level in Call of Duty 9: World War IV. During High School, he had a relationship with Karyn Fuller (a mild GSD case) which ended badly. He burned a lot of bridges with a major temper outbreak his last year; this may be when the spiritual parasite attached. He enlisted in the Marines on the day he turned 18, Dec 27, 1995. During his hitch in the Marines, he spent approximately a year and a half in Gunny Bardue's unit, and then was in the Equalizer unit, which is the basis for the Dragonslayers myth for most of the remainder. The Hijacker is a device able to infect large systems with a virus that, in time, sequentially destroys all the sub-systems attached to it. The Hijacker can kidnap enemy Vehicles, turning them into friendly vehicles. It loses its life in the proccess. In order to kidnap, the hijack must "touch" the vehicle. When standing still, the hijacker becomes cloaked. The hijacker is sometimes used to capture enemy harvesters, causing economic damage to the opponent. A hijacker is system modification software deployed without adequate notice, consent, or control to the user. Hijackers often unexpectedly alter browser settings, redirect Web searches and/or network requests to unintended sites, or replace Web content. Hijackers may also frustrate user's attempts to undo these changes, by restoring hijacked settings upon each system start.
n26:
Howard Mitchell; Howard Mitchell from Venom Vol 2 9.JPG
dcterms:subject
n6: n9: n11: n13: n19: n32: n34: n36: n45: n46: n49: n52: n53: n57: n60: n64: n65: n77: n84: n85: n88: n89: n90: n92: n95:
n33:
*Face My Enemy Agents of S.H.I.E.L.D.
n39:
No
n27:
n28: n79:
n14:wikiPageUsesTemplate
n15:
n21:wikiPageUsesTemplate
n22: n48: n86:
n82:wikiPageUsesTemplate
n83:
n3:wikiPageUsesTemplate
n4: n37: n80:
n42:wikiPageUsesTemplate
n43: n56: n67:
n70:wikiPageUsesTemplate
n71:
n17:wikiPageUsesTemplate
n18: n35: n66:
n68:
n69:
n20:
Bear Company
n81:
Day 11, 2021
n10:
Active
n72:
n73:
n58:
Hijacker
n54:
n55:
n40:wikiPageUsesTemplate
n41:
n16:
No
n78:
SCAR-H w/Silencer, M9 w/Silencer
n44:
Ultranationalists
n94:
500
n59:
Hench App's Hijacker; Hijacker in Astonishing Ant-Man Vol 1 3 001.jpg
n23:
Captain Toby Lane
n29:
n30: n62:
n91:
n61:
n87:
12.0
n47:
Oil Rig in Atlantic Ocean
n24:
n25:
n38:
Get on board the train. Take out the guard. Make your way to the controls. Hack it to Shadow Company's bases in America. Jump into the Zodiac with the team.
n76:
n62:
n7:wikiPageDisambiguates
n8: n31: n63: n93:
n7:abstract
Hijacker is the seventeenth level in Call of Duty 9: World War IV. The Hijacker can kidnap enemy Vehicles, turning them into friendly vehicles. It loses its life in the proccess. In order to kidnap, the hijack must "touch" the vehicle. When standing still, the hijacker becomes cloaked. The hijacker is sometimes used to capture enemy harvesters, causing economic damage to the opponent. During High School, he had a relationship with Karyn Fuller (a mild GSD case) which ended badly. He burned a lot of bridges with a major temper outbreak his last year; this may be when the spiritual parasite attached. He enlisted in the Marines on the day he turned 18, Dec 27, 1995. During his hitch in the Marines, he spent approximately a year and a half in Gunny Bardue's unit, and then was in the Equalizer unit, which is the basis for the Dragonslayers myth for most of the remainder. One of the first of the Dragonslayer kills was Ravager. The Darwin Rager's Night one was number four, sometime around Christmas 1997 (98 seems to be too late). He transferred back to Camp Pendleton as a weapons instructor before he was kicked out on a medical discharge a couple of months before his enlistment was due to be up. He spent several months trying to get a job, and finally managed to land one at Whateley due to Gunny Bardue's help. This was in late January 2000. In the first year he ran across Pauline Maxwell, a GSD student who was attempting to commit suicide in one of the weapons bunkers. He tried to help her, but she went home and committed suicide in June 28, 2001. He got a small group of students interested in Parkour (the running game), and also made up to Backdraft enough so he eventually gave her an engagement ring. In Fall 2006, Backdraft was killed during the Halloween invasion. Mahren went berserk and had to be pulled out by Lady Astarte. Hijacker is a vehicle hacking upgrade in Watch Dogs 2. It allows the player to hack vehicles' electric locks instead of lockpicking, so the player will not attract any attention when stealing a vehicle. Without this upgrade, the player will just pick the lock of a vehicle, causing its alarms to go off, which will result in a heat level. This upgrade costs 4 Research Points and requires the previous hack, Vehicle Directional Hack, to be unlocked. It unlocks Chopper Retreat Exploit. The Hijacker is a device able to infect large systems with a virus that, in time, sequentially destroys all the sub-systems attached to it. A hijacker is system modification software deployed without adequate notice, consent, or control to the user. Hijackers often unexpectedly alter browser settings, redirect Web searches and/or network requests to unintended sites, or replace Web content. Hijackers may also frustrate user's attempts to undo these changes, by restoring hijacked settings upon each system start.
Subject Item
n50:
n51:
n2:
Subject Item
n61:
n24:
n2:
Subject Item
n74:
n75:
n2: