This HTML5 document contains 319 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n227http://dbkwik.webdatacommons.org/resource/3PtJFMd4zFaAm8on0c8QuA==
n228http://dbkwik.webdatacommons.org/resource/KJhL3iHGwqTrWkk2GfcgMw==
n6http://dbkwik.webdatacommons.org/resource/m5268hoCy0FopVdhvAYd7w==
n169http://dbkwik.webdatacommons.org/resource/1S150ndPaWUojHHDExWNEg==
n180http://dbkwik.webdatacommons.org/resource/_hll6Hv4LaMbG4H3LH7XmA==
n48http://dbkwik.webdatacommons.org/resource/o_7SK3nrARiBLAixap9j9A==
n70http://dbkwik.webdatacommons.org/resource/hMqxxnqb8mftw8U1T187wA==
n147http://dbkwik.webdatacommons.org/resource/2vjX1EC3lw0OCnTW36DZkg==
n233http://dbkwik.webdatacommons.org/resource/CdKMxFfmJCrx1tMQ2ZFl1w==
n57http://dbkwik.webdatacommons.org/resource/z2LI5wbqUrEtjkR83A4SLA==
n220http://dbkwik.webdatacommons.org/resource/uHOq1RdjbFnxkL1BGNz9rA==
n30http://dbkwik.webdatacommons.org/resource/u5k4bdoRFUJv0lF0UKe2Tg==
n37http://dbkwik.webdatacommons.org/resource/i2ydhLqGWWCxMTAhmnttaA==
n25http://dbkwik.webdatacommons.org/resource/5di1cKO9ZL15JcMz2vxykg==
n152http://dbkwik.webdatacommons.org/resource/FmHmczm7Hm2I7zrpit_3pg==
n202http://dbkwik.webdatacommons.org/resource/10GY8zWkHFGJbAg9_0XlMQ==
n154http://dbkwik.webdatacommons.org/resource/rxkOgx3iPZs3XvimUxipDw==
n186http://dbkwik.webdatacommons.org/resource/oPEiEp_Ma_kHOO8rXbc9Ag==
n63http://dbkwik.webdatacommons.org/resource/z4utu_E1T8Fi94iR6f0mEg==
n240http://dbkwik.webdatacommons.org/resource/ZTUaU13RT-IqqwhDRwi_2Q==
n244http://dbkwik.webdatacommons.org/resource/d6rMIgU_JEPyWVkz3nQXNw==
n50http://dbkwik.webdatacommons.org/resource/qiEskEzxMs-iTn3unyIntA==
n95http://dbkwik.webdatacommons.org/resource/yxDn5PhafHQ-ggXyYqHwRA==
n158http://dbkwik.webdatacommons.org/resource/2XrHrlJ61rjl9l4nXRTdeQ==
n191http://dbkwik.webdatacommons.org/resource/aZVILW9CoIy9a1AlB3kUgQ==
n5http://dbkwik.webdatacommons.org/resource/eidPvOsjysWkI3ICrt8SEQ==
n82http://dbkwik.webdatacommons.org/resource/KH9u0hfvCtOkb8ohphr2yQ==
n7http://dbkwik.webdatacommons.org/resource/PAZIvdFXaDJTVasbjK2XTA==
n52http://dbkwik.webdatacommons.org/resource/DazaUm1Fyk5oo5hjuhq5Pg==
n214http://dbkwik.webdatacommons.org/resource/NWejT2BOCH-YUhUjNRXCyg==
n223http://dbkwik.webdatacommons.org/resource/4MVCxK2gkYu5_mEOC2gCHQ==
n88http://dbkwik.webdatacommons.org/pirates/property/
n229http://dbkwik.webdatacommons.org/wowwiki/property/
owlhttp://www.w3.org/2002/07/owl#
n84http://dbkwik.webdatacommons.org/resource/GPO_XRn3za7DWER23FEH9A==
n198http://dbkwik.webdatacommons.org/resource/ZEKmU1FCoyLjobVxpyKZZA==
dbrhttp://dbpedia.org/resource/
n11http://dbkwik.webdatacommons.org/resource/PaWA-ptuqrzYmkmAfDUR7Q==
n74http://dbkwik.webdatacommons.org/resource/KLlZoW9o6VljwfZovC36SQ==
n194http://dbkwik.webdatacommons.org/resource/AAxasRDohmx23CE9D02bqQ==
n135http://dbkwik.webdatacommons.org/resource/8Og75LT5hixDLn03cwQvmQ==
n45http://dbkwik.webdatacommons.org/resource/hYgwm6wzr67klfPxCiikKQ==
n205http://dbkwik.webdatacommons.org/resource/eLOytIc6r8Syuzyl-fQQ7w==
n222http://dbkwik.webdatacommons.org/resource/jMlZep3fwPpYrKOGEhcMXQ==
n40http://dbkwik.webdatacommons.org/resource/3yEdKoldmjNRKkGfBALzmw==
dctermshttp://purl.org/dc/terms/
n185http://dbkwik.webdatacommons.org/resource/7uFjxWnJwsv83nznZFpJTQ==
n120http://dbkwik.webdatacommons.org/resource/FWsu5HXZthG-WIPcA2Bp1A==
n132http://dbkwik.webdatacommons.org/resource/ooJPUF--I83Sv79ivZtiIQ==
n174http://dbkwik.webdatacommons.org/resource/NSeoLfYti5hEqkBMWD20KA==
n18http://dbkwik.webdatacommons.org/resource/x3LRM08gSZSOCs-KkDHsbg==
n235http://dbkwik.webdatacommons.org/resource/6WDIOIaMvbPBaPuQQ_pVQQ==
n21http://dbkwik.webdatacommons.org/resource/Nh3mkLxlFdBOCnMNW9D-Kg==
n208http://dbkwik.webdatacommons.org/resource/cA1ls4FSqlUhDYE3fsmxLA==
n167http://dbkwik.webdatacommons.org/resource/-G2yQVOBUfOZAI4gc1p5Xw==
n42http://dbkwik.webdatacommons.org/resource/Dfj3_H9nR3cu8MwXsJR_OQ==
n69http://dbkwik.webdatacommons.org/all-the-tropes/property/
n224http://dbkwik.webdatacommons.org/resource/nkzs9r5kknG0aXKX82A5ZQ==
n231http://dbkwik.webdatacommons.org/resource/js2MFYsgMct4U6rL_OUDSQ==
n168http://dbkwik.webdatacommons.org/resource/6p3F6S_jot8DwaLyVxKvfQ==
n31http://dbkwik.webdatacommons.org/resource/3ViVARidrostNAEG8qJQ-A==
n200http://dbkwik.webdatacommons.org/resource/W7ScTW8JYHoMY8ASNVY9yg==
n86http://dbkwik.webdatacommons.org/resource/YnNBg-6_Gmb7Oy6FaywMKA==
n68http://dbkwik.webdatacommons.org/resource/Uvh53lg3bvx7UbTeybfFYg==
n143http://dbkwik.webdatacommons.org/resource/EBTk8fB32gpdlsr7xXF73Q==
n122http://dbkwik.webdatacommons.org/resource/Z2fbBdaAEo1DNMB5keLUbg==
n124http://dbkwik.webdatacommons.org/resource/rvVS9YWoRahWdLpYIu8RaQ==
n219http://dbkwik.webdatacommons.org/resource/XktSwY8AxbBL7ZXUK91pZQ==
n59http://dbkwik.webdatacommons.org/resource/hQmsfJFtefcuXANZTVy28w==
n150http://dbkwik.webdatacommons.org/resource/Vk7aze7hMCBdBBJZgCdwHA==
n123http://dbkwik.webdatacommons.org/resource/vnxpuSmqcIF7bkT6J5Yagg==
n161http://dbkwik.webdatacommons.org/resource/3osZ1fdOC2rdHUzmCaywLQ==
n94http://dbkwik.webdatacommons.org/resource/Ojgm1K29c1IIV1CyPlutkw==
n199http://dbkwik.webdatacommons.org/resource/21u5cqZO5vYzLHeab4MWeg==
n28http://dbkwik.webdatacommons.org/megaman/property/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n133http://dbkwik.webdatacommons.org/resource/88VH4sXIi1TIaeOKVct5-g==
n99http://dbkwik.webdatacommons.org/resource/w4LcLpZYisRbpXKjX2a5yw==
n15http://dbkwik.webdatacommons.org/resource/PPtEcvpqmSGTimLmXlEbOA==
n22http://dbkwik.webdatacommons.org/resource/hGvPDKu8PlKBsYZB3Ov4yw==
n67http://dbkwik.webdatacommons.org/resource/63WxSOrba_D1y4dPgal3hA==
n178http://dbkwik.webdatacommons.org/resource/SqLodRBd6Rf6ps_SrP8DVw==
n192http://dbkwik.webdatacommons.org/resource/Sdvr4UUm5NlTStWSoHFQng==
n142http://dbkwik.webdatacommons.org/resource/deUUtgsVbTVpXYGItZZvtg==
n145http://dbkwik.webdatacommons.org/resource/68TdRi-tVGqrWmPDI-HvtQ==
n29http://dbkwik.webdatacommons.org/resource/4cIAeP1GbWe3cj__D8_dLw==
n12http://dbkwik.webdatacommons.org/resource/LWIT-B11y7j3AZ3ylWAjrw==
n90http://dbkwik.webdatacommons.org/resource/ianpcIFWL6s6lxHzphvRxg==
n66http://dbkwik.webdatacommons.org/ageofempires/property/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n121http://dbkwik.webdatacommons.org/resource/ru9ecc0C0v1EzvSCXctiVw==
n241http://dbkwik.webdatacommons.org/resource/ZcHyb_WZruTzJ3t_aFBAXA==
n148http://dbkwik.webdatacommons.org/resource/__sC1MJkU6dGFAqV5GYfaA==
n165http://dbkwik.webdatacommons.org/resource/KIsqcQuhSo7FqJmFhW1pkg==
n211http://dbkwik.webdatacommons.org/resource/UQaCqe_tRI3sjr1OKxzCFQ==
n17http://dbkwik.webdatacommons.org/resource/UjubdpSSNQ_0WFNtcNfZtQ==
n226http://dbkwik.webdatacommons.org/resource/NmX2VcWLyM2V0ZlTYUcCIw==
n125http://dbkwik.webdatacommons.org/resource/LtwdbGvFTbN4VkS6pvLinQ==
n44http://dbkwik.webdatacommons.org/resource/d2tbx6MrWILUzFLEyc9O2A==
n119http://dbkwik.webdatacommons.org/resource/89cA7T711NXqAuUoH4UCDA==
n173http://dbkwik.webdatacommons.org/resource/ePzHdEbOZ6pnSyGNrC4hWw==
n149http://dbkwik.webdatacommons.org/resource/Pqv16rRY2mX1evSPgXcqkQ==
n91http://dbkwik.webdatacommons.org/resource/_1ZgkyyjmX_k_R5IpZaIGA==
n116http://dbkwik.webdatacommons.org/resource/7VNSuTt7Su0hvUx4vBqs0A==
n32http://dbkwik.webdatacommons.org/survivor/property/
n55http://dbkwik.webdatacommons.org/resource/TxH_XX7oTYkqMDhNiRTeJg==
n16http://dbkwik.webdatacommons.org/resource/M8nx7OMtslnHTJ7ZyqNAoQ==
n129http://dbkwik.webdatacommons.org/resource/9VtFNWM7qbv4QesIrmRrYw==
n77http://dbkwik.webdatacommons.org/assassinscreed/property/
n78http://dbkwik.webdatacommons.org/resource/5gSAgzZF9KXqcmPyycpZAQ==
n107http://dbkwik.webdatacommons.org/resource/bMNSiw6oS8nNu3ewkn58hA==
n56http://dbkwik.webdatacommons.org/resource/055Y6cP4fgP4F2jKbqxjrA==
n79http://dbkwik.webdatacommons.org/resource/zorlihFRIgJ68WIdeLOmBQ==
n35http://dbkwik.webdatacommons.org/resource/PHG9P8TqJH2sfBHMG17Ciw==
n26http://dbkwik.webdatacommons.org/resource/bK2OtT8ESR23y-8DAnTk-A==
n43http://dbkwik.webdatacommons.org/resource/-F5QeGLIivf5Q1Viz6RcIQ==
n193http://dbkwik.webdatacommons.org/resource/XUC2A3SkXurMsfkXV7M6kg==
n76http://dbkwik.webdatacommons.org/resource/O1alER_qJejgyCTgganrsQ==
n153http://dbkwik.webdatacommons.org/resource/hTbmovzzQHmfLkpRCE8Tkw==
n234http://dbkwik.webdatacommons.org/resource/hnkDH3Yh6qeiwOK4wLLIrg==
n34http://dbkwik.webdatacommons.org/resource/pFBiRQzlxadYyd2acwUJHQ==
n96http://dbkwik.webdatacommons.org/ontology/
n101http://dbkwik.webdatacommons.org/resource/8hSEsZ8dlRVrgmCa-JHXcA==
n187http://dbkwik.webdatacommons.org/resource/zB_ifRPFeuUKMN4tffDQsw==
n72http://dbkwik.webdatacommons.org/resource/05pMzoqDnjDJeBAwmjKN3w==
n83http://dbkwik.webdatacommons.org/resource/b_STRc5fbfM2Pl_qnLdKaw==
n162http://dbkwik.webdatacommons.org/resource/7kn5zDHxuxswBeRvolT7Pw==
n243http://dbkwik.webdatacommons.org/resource/qya6joret2tI_QBXMIsLyQ==
n238http://dbkwik.webdatacommons.org/resource/x2P5iJ-43IzONnWQkSoijw==
n249http://dbkwik.webdatacommons.org/resource/3iUq4LFc3zgDMQFtbqdWcQ==
n250http://dbkwik.webdatacommons.org/resource/448ikOHIrt77uXhFsvkK_w==
n157http://dbkwik.webdatacommons.org/resource/bF74MWJMgDT0-laM3od5Zg==
n160http://dbkwik.webdatacommons.org/resource/XJ02lsDGSInR7EXy5cAvxA==
n81http://dbkwik.webdatacommons.org/resource/IGhZYr6IUF7mXS98X0zK-w==
n252http://dbkwik.webdatacommons.org/resource/EhdReG4NbfAsU1jWEgpOoA==
n253http://dbkwik.webdatacommons.org/resource/4Z-fTUj3Kb1KJ6MfIW7ERA==
n109http://dbkwik.webdatacommons.org/resource/tj0Z7rHaovsQK5ntKuzsJA==
n47http://dbkwik.webdatacommons.org/resource/xzgUbJdS5eSu3ocnBI6fWw==
n54http://dbkwik.webdatacommons.org/resource/27EQyoXm3odzDrYYRXkY6Q==
n139http://dbkwik.webdatacommons.org/resource/zQvuSUgYECkQq8wtLFi-Cw==
n53http://dbkwik.webdatacommons.org/resource/q5jHY3Qk1gG_mBN7RUVvZw==
n236http://dbkwik.webdatacommons.org/resource/PPB4h1uxAwGLLcF9yjSTjA==
n8http://dbkwik.webdatacommons.org/resource/aMDpEYWzMsPI_SesN5PYJA==
n177http://dbkwik.webdatacommons.org/resource/a77tBPlc4n9H3XtSD0WZig==
n36http://dbkwik.webdatacommons.org/uncyclopedia/property/
n164http://dbkwik.webdatacommons.org/resource/RByKSTr_53wNEcIuNUj9PQ==
n134http://dbkwik.webdatacommons.org/resource/WLLkrDZAX5NfTQdJogIX3Q==
n201http://dbkwik.webdatacommons.org/resource/SNYd-koM0rxUTIGXg5m0Ig==
n106http://dbkwik.webdatacommons.org/resource/IavPjo7WyBN_Syd2r22AhQ==
n38http://dbkwik.webdatacommons.org/resource/MH9AlBO0hgD5Es_CjYXb_Q==
n39http://dbkwik.webdatacommons.org/resource/lWtlPlKT1iUD5et_k6TMmw==
n49http://dbkwik.webdatacommons.org/resource/57boOCXjMxqwqGPa2p7vOA==
n151http://dbkwik.webdatacommons.org/resource/ynufjSM0b807EOSr-BLluA==
n23http://dbkwik.webdatacommons.org/resource/Vxlbvmsh9us5jz0SY-5GYQ==
n206http://dbkwik.webdatacommons.org/resource/QIek7oZG33xj4ivJwShyNQ==
n51http://dbkwik.webdatacommons.org/resource/UsXB1Ef9nQLGFpZETPJ9ag==
n130http://dbkwik.webdatacommons.org/resource/6K3F5V46aaJNiY74Wzz9hw==
n163http://dbkwik.webdatacommons.org/resource/bru9iaM68dyhe56pEjhzwg==
n64http://dbkwik.webdatacommons.org/religion/property/
n33http://dbkwik.webdatacommons.org/resource/meVNWuNEYFh4QOXmjZ12dg==
n89http://dbkwik.webdatacommons.org/resource/86rU6hyfxoAxdLziLCZquw==
n188http://dbkwik.webdatacommons.org/resource/FDEP5mqCfNHzeiHl5xC3TA==
n140http://dbkwik.webdatacommons.org/resource/CPFCUMS6pzLTNjVL8ojAoA==
n108http://dbkwik.webdatacommons.org/resource/MBG158moK_5u2GVeOdcw0A==
n115http://dbkwik.webdatacommons.org/resource/6JuPrH9bOSpB5-RzZcRE3A==
n100http://dbkwik.webdatacommons.org/resource/7i3H55xJEWEGlXL3YCS25w==
n184http://dbkwik.webdatacommons.org/resource/Pn2IINYsRQm5PR1jnKRo6Q==
n138http://dbkwik.webdatacommons.org/resource/TUPnXIk1NBR_2wfmnHwALQ==
n128http://dbkwik.webdatacommons.org/stargate/property/
n73http://dbkwik.webdatacommons.org/resource/071e6SjTuCXXDqk7BtwB_w==
n203http://dbkwik.webdatacommons.org/resource/P_9SSvSLnG8nvWTnFz2eZg==
n225http://dbkwik.webdatacommons.org/resource/p3MBI2UKV_-7DuGbLDHmAQ==
n146http://dbkwik.webdatacommons.org/resource/so3RlV8kRYf2Rd1vUY-GsA==
n24http://dbkwik.webdatacommons.org/saintsrow/property/
n127http://dbkwik.webdatacommons.org/resource/z5yLOAyMcsn2X3r2-e8Kbw==
n61http://dbkwik.webdatacommons.org/resource/NpGFCU1gk4LOrwXO92L9XQ==
n209http://dbkwik.webdatacommons.org/resource/QBnQH3Ct8zuMbUFXh7lmnA==
n62http://dbkwik.webdatacommons.org/resource/yfl7ACHqkV55fU8_639DYw==
n213http://dbkwik.webdatacommons.org/resource/K2x9_t98jRmywl1zVcseng==
n98http://dbkwik.webdatacommons.org/resource/UnDipahpDqhUBQHIT-NMRQ==
n103http://dbkwik.webdatacommons.org/resource/_hJ_f6nnC8NO6PsxIfoF3Q==
n114http://dbkwik.webdatacommons.org/resource/pC75ytBgf1TPaQ-CBrLWag==
n170http://dbkwik.webdatacommons.org/resource/NolrXYdFs03L6IP_t1UE0w==
n210http://dbkwik.webdatacommons.org/resource/8gb8DPWhpdRBN6s5VFFZpg==
n181http://dbkwik.webdatacommons.org/resource/-j6Wndj55HvDhuT8uVzPxQ==
n19http://dbkwik.webdatacommons.org/resource/ru58o_XaKfJNVwQ4K2risA==
n102http://dbkwik.webdatacommons.org/memory-beta/property/
n112http://dbkwik.webdatacommons.org/resource/wNFGyen-Q2lyZj-eZhoHHA==
n172http://dbkwik.webdatacommons.org/resource/VzyU4clC6C5CjMFEw4t4JQ==
n242http://dbkwik.webdatacommons.org/resource/pVGTOiw_wBIKVaWM-RTOSw==
n218http://dbkwik.webdatacommons.org/resource/GqYC7MrxRJe_jNadgJom1A==
n80http://dbkwik.webdatacommons.org/personofinterest/property/
n2http://dbkwik.webdatacommons.org/resource/TElxjxLsSbcLKF3PaRIOZA==
n137http://dbkwik.webdatacommons.org/resource/d6UgrU5HQAF6Ndttwt_Nxw==
n221http://dbkwik.webdatacommons.org/resource/lqAJD5CoJiH4QkuGOupOvg==
n183http://dbkwik.webdatacommons.org/resource/GlzHRTCvyGMwB1a4UFrr1g==
n204http://dbkwik.webdatacommons.org/resource/5BppoFV1K8S0sCe7H0sR6Q==
n179http://dbkwik.webdatacommons.org/resource/7YONwGskRtp7_k7Rb-0a0g==
n104http://dbkwik.webdatacommons.org/resource/qA3QZ5sUm1ocRD23ZNPDgQ==
n9http://dbkwik.webdatacommons.org/nonciclopedia/property/
n144http://dbkwik.webdatacommons.org/resource/I0GgZKoyitsMJ-2WGi6zlw==
n232http://dbkwik.webdatacommons.org/resource/VTAM16yf3NnIfwCkc5FVjQ==
n131http://dbkwik.webdatacommons.org/resource/Wgs0J3xT2mCwECsKvsUxbQ==
n245http://dbkwik.webdatacommons.org/resource/Oo4hEv015qRo4AqRgIzaTQ==
n60http://dbkwik.webdatacommons.org/resource/-8V2xG7GAYYOorh57b8dzA==
n71http://dbkwik.webdatacommons.org/resource/a4XsVNheYh2i9DnknwUbPg==
n141http://dbkwik.webdatacommons.org/resource/JkwpzT9xuqphTOKCsZWMPg==
n251http://dbkwik.webdatacommons.org/resource/oS5VMAwf_cnhShY9n0Ux1g==
n85http://dbkwik.webdatacommons.org/resource/LImHLfqQkjl4hZMdqx80RA==
n105http://dbkwik.webdatacommons.org/resource/kDag_GAmt-FaHHrU1M4PwA==
n207http://dbkwik.webdatacommons.org/resource/6TyAxs0ENK8fEiylNv3ypw==
n65http://dbkwik.webdatacommons.org/resource/hqCR6drUr1CJBgpFF0GYqg==
n216http://dbkwik.webdatacommons.org/resource/zHfbiclguMJxrM9MvQAdOg==
n182http://dbkwik.webdatacommons.org/resource/KkVvO3QF3w7Fe40sEFU_6A==
n93http://dbkwik.webdatacommons.org/wikiality/property/
n136http://dbkwik.webdatacommons.org/resource/Vv7nhbFDdSfLqp0U7TZbOg==
n246http://dbkwik.webdatacommons.org/resource/yTb5WbS7dBCN1CYbxmA27w==
n196http://dbkwik.webdatacommons.org/computersecurity/property/
n87http://dbkwik.webdatacommons.org/resource/OqCw3z15mj5BvTMKMkU2VQ==
n230http://dbkwik.webdatacommons.org/resource/T3LxsIc7ksOr8zmURsf_Tg==
n10http://dbkwik.webdatacommons.org/resource/KDRQCa0jUS9c6q2Izlj2gQ==
n195http://dbkwik.webdatacommons.org/resource/wLNRA8mcpFP47FD_W_4MSQ==
n215http://dbkwik.webdatacommons.org/resource/L2-f_TcNxwAk_MqXV8fhMg==
n75http://dbkwik.webdatacommons.org/resource/LUvX1ai-HQU9xM_LcPdO5A==
n247http://dbkwik.webdatacommons.org/resource/giDH7stgEXcNnt23ygBJ4w==
n126http://dbkwik.webdatacommons.org/resource/H-5gsJILqblFYKGvs3pcXg==
n212http://dbkwik.webdatacommons.org/resource/DpSEWm1XV-K7jDuUtIfmhw==
n41http://dbkwik.webdatacommons.org/resource/WmSslEg-ORJu3ECMml8dVA==
n248http://dbkwik.webdatacommons.org/resource/TJi_iNiXpNcC86LVwp-Y3A==
n46http://dbkwik.webdatacommons.org/allthetropes/property/
n239http://dbkwik.webdatacommons.org/resource/X1jIRt_azRe589TQdtXl4g==
n110http://dbkwik.webdatacommons.org/resource/wGrhe_FoCqUtWSWw2zragg==
n197http://dbkwik.webdatacommons.org/resource/7lydXaUR6RhPzwzX8JmDAw==
n171http://dbkwik.webdatacommons.org/resource/upxGxfN8Ki0SwrM0wwYAXA==
n118http://dbkwik.webdatacommons.org/resource/LOv4eiRDTKvl_GhHGUCypA==
n217http://dbkwik.webdatacommons.org/resource/Mq01vJlS1JrWdK81jFXhZw==
n156http://dbkwik.webdatacommons.org/resource/cZ1ls1dCGtOucqaSZEZZTw==
n13http://dbkwik.webdatacommons.org/resource/HvJeg61wvMTBpMB1mhKqww==
n189http://dbkwik.webdatacommons.org/resource/vgC4Uj0mivx6F_hDKhJ5Kw==
n155http://dbkwik.webdatacommons.org/resource/uCgiVhoPv3_Sp6VCMOvq2Q==
n58http://dbkwik.webdatacommons.org/resource/joXLla15LSThLDxF9oYEmw==
n166http://dbkwik.webdatacommons.org/resource/ZJEkCLYMT-XytMh8hOQPJA==
n3http://dbkwik.webdatacommons.org/resource/IJISC3Q7KQGcubu6gRsbkA==
n237http://dbkwik.webdatacommons.org/resource/RgRMvgXi5nQ2-BimVxO2-Q==
n20http://dbkwik.webdatacommons.org/resource/RiaMY-W7ua567zJeXjY1LA==
n97http://dbkwik.webdatacommons.org/itlaw/property/
n111http://dbkwik.webdatacommons.org/resource/_c8OdhphRKRjwNpaE4f4yg==
n117http://dbkwik.webdatacommons.org/resource/WajsMKfnUnQgKQSVHDQ8Tg==
n159http://dbkwik.webdatacommons.org/resource/azV-Dvc6T-rADNoEf2BntQ==
n14http://dbkwik.webdatacommons.org/resource/k1wUXmtWsem5bb2UWOMKIA==
n113http://dbkwik.webdatacommons.org/resource/XwczvcRwMV5WQ-E9VWl1TA==
xsdhhttp://www.w3.org/2001/XMLSchema#
n92http://dbkwik.webdatacommons.org/resource/3ILjI5PjCLuUJPPLwB77tw==
n190http://dbkwik.webdatacommons.org/resource/T3tNrklvXiVO4ujkGSdFHw==
Subject Item
n190:
n56:
n2:
Subject Item
n178:
n20:
n2:
Subject Item
n18:
n19:
n2:
Subject Item
n218:
n96:wikiPageDisambiguates
n2:
Subject Item
n57:
n53:
n2:
Subject Item
n2:
rdf:type
n195: n227: n243:
rdfs:label
Trojan Horse Trojan horse Trojan Horse
rdfs:comment
Trojan Horse is a tale from the Trojan War about the subterfuge that the Greeks used to enter the city of Troy and win the war. The Greeks constructed a huge wooden horse, and hid a select force of men inside. The Greeks pretended to sail away, and the Trojans pulled the horse into their city as a victory trophy. That night the Greek force crept out of the horse and opened the gates for the rest of the Greek army, which had sailed back under cover of night. The Greeks entered and destroyed the city of Troy, decisively ending the war. Dr. Daniel Jackson compared the Scarab miniature naquadah bomb placed inside Cassandra to the Trojan Horse. (SG1: "Singularity") Computer viruses and trojans are often confused with each other and often used interchangeably. While their effects can be similar they are different primarily in how they infect your computer. A trojan can infect your computer through any odd executable file you might have downloaded (for whatever reason), and these days even from an infected media file. This means the user has to actively run or load something to infect their computer. Most trojans are activated through some form of Social engineering scheme. The Trojan horse was, in the epic poem The Aeneid, a wooden horse presented as gift to the city of Troy during the Trojan War which, when brought inside the city gates, was discovered to hold Greek troops inside. Over time, the term "Trojan horse" has come to mean any seemingly benign object which holds a hidden threat or danger. The term is also used in computer programming, to describe a damaging program disguised as a non-dangerous one. (VOY short story: "A Taste of Spam") In Greek mythology, the Greeks were besieging the city of Troy but could not break the Trojans' resistance. Then they built a huge wooden horse, in which they hid dozens of warriors. They gave it to the Trojans as a gift, which the Trojans accepted. Once inside the city, the warriors poured out of the horse and captured Troy. The Trojan Horse is an idol in the Walls of Troy multiplayer map and is the target for the Trojans team. The Spartans try to protect this while trying to destroy the Statue of Apollo. It also appears on the Troy background for the Combat Arena of God of War: Ghost of Sparta. When the Geek's supreme banana - IBM - said "Let there be code.", every Programming Language was created. Then, he created one minor apple for each language, such as Java, Pascal, C, C+ and C++. But IBM wasn't a good banana at all. He explored the money of the geeks, made a law for a compulsory daily sacrifice of a virgin geek (which is not that hard to find...) and ordered the geeks to make Code prayers for his pleasure. After that, some of the Geek priests, unhappy with the extremely hard-doing desires of IBM, have gone to the "Dark Side of The Code" and created themselves a brand new orange, later called "The Trojan Horse" . The geeks wanted vengeance for the creation of IBM by the humans. Since then, more and more Geeks have been invoking the Trojan Horse to do malevolent things to hum NOTE: The Trojan Horse was removed from later versions of Fall from Heaven, as its main feature - the ability to not have your units pushed out of the border on a war declaration - was replaced by the Council of Esus's new ability. Ever since Odysseus ended ten years of futile war with a spot of carpentry, this has been one of the favourite tactics of clever characters faced with impregnable defenses. In the simplest version, the Greeks simply hide inside a object which they know the Trojans will be unable to resist picking up and taking inside their defenses. If the Trojans aren't complete idiots, subterfuge will be used to get them to accept the object -- anything from disguising it as a Trojan vehicle up to a full-blown Xanatos Roulette. Common variations include hiding a well-trained animal inside the Trojan Horse, or a computer program. In Speculative Fiction the Horse itself might be a robot or shape shifter. "Trojan Horse" is the 19th episode of season 2, and the 43rd produced hour of Person of Interest. It originally aired on April 4, 2013. Named after the wooden horse from Greek mythology, a Trojan horse is a A Trojan Horse is the nick-name given to Zodiac Boarding Craft, and, curiously, the name of the Bomb planted inside Troy Station. The main ancient source for the story is the Aeneid of Virgil, a Latin epic poem from the time of Augustus. The event is referred to in Homer's Odyssey. In the Greek tradition, the horse is called the "Wooden Horse" (Δούρειος Ἵππος, Doúreios Híppos, in the Homeric Ionic dialect). Metaphorically a "Trojan Horse" has come to mean any trick or stratagem that causes a target to allow a foe into a securely protected bastion or space. A malicious computer program which tricks users into willingly running it is called a "Trojan horse". Trojan Horse (トロイノモクバ Toroi no Mokuba?) is the final boss of the game Rockman.EXE Legend of Network. It is a Trojan horse that was inside RideMan.EXE. In battle, the boss has 2000 HP. The Trojan Horse (Ancient Greek: Δούρειος Ἵππος/Doureios Hippos, meaning Wooden Horse) is a huge wooden construction, that appears in the Greek part of the Fall of the Trident campaign in Age of Mythology. A Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk. In one celebrated case, a Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. The Trojan Horse was a tactical device, a troop transport disguised as an example of constructed sculpture, a statue depicting an artistic rendition of a horse. The Trojan Horse was used on ancient Earth by the Greeks at the seige of Troy, during the Trojan War. (TOS novel: The Fearful Summons)
owl:sameAs
dbr:Trojan_Horse
n79:
Trojan Horse
dcterms:subject
n5: n7: n21: n22: n34: n38: n41: n45: n49: n50: n51: n55: n58: n60: n61: n62: n63: n72: n73: n85: n86: n87: n90: n92: n100: n101: n105: n108: n115: n116: n117: n118: n121: n124: n125: n131: n142: n147: n149: n153: n156: n158: n164: n171: n179: n181: n185: n187: n201: n203: n207: n208: n216: n217: n221: n231: n233: n247: n251:
n119:
Age of Mythology
n42:
19
n76:
2
n35:
Pierce Hack Crush
n206:
by perculia 2014/01/02 3:32 PM
n23:
150
n242:
10
n30:
n31: n39:
n66:wikiPageUsesTemplate
n67: n71: n74: n137: n145:
n69:wikiPageUsesTemplate
n70: n91: n112: n198: n248:
n46:wikiPageUsesTemplate
n47: n95: n110: n139: n148:
n77:wikiPageUsesTemplate
n78: n82: n106: n159:
n28:wikiPageUsesTemplate
n29: n133: n138: n232:
n102:wikiPageUsesTemplate
n103: n152: n167: n169: n170: n188: n191: n210:
n9:wikiPageUsesTemplate
n10: n14: n135: n212:
n80:wikiPageUsesTemplate
n81: n146: n155: n184: n226: n238:
n88:wikiPageUsesTemplate
n89: n150: n165: n204: n244:
n64:wikiPageUsesTemplate
n65: n75: n237: n241: n253:
n24:wikiPageUsesTemplate
n25: n54: n104: n109: n111: n140: n144: n154: n157: n162: n202: n205: n224: n225: n236: n252:
n128:wikiPageUsesTemplate
n129: n192:
n32:wikiPageUsesTemplate
n33: n44: n59: n120: n122: n127: n132: n134: n168: n174: n183: n186: n200: n219: n234:
n36:wikiPageUsesTemplate
n37: n40:
n229:wikiPageUsesTemplate
n230: n235:
n196:wikiPageUsesTemplate
n197: n214:
n93:wikiPageUsesTemplate
n94: n130:
n56:
n57:
n199:
14.57M
n249:
n250:
n143:
August 1503
n173:
5
n213:
n83:
n228:
23
n182:
2627.0
n215:
Assassin's Creed: Brotherhood
n12:
Jerome Eckert - Dan Bittner n99: n31: Martin Baxter - Larry Bryggman Ross Haskell - Andrew Rothenberg
n16:
n17:
n6:
Jim Cochran Rick Ozzy Edna Sophie Whitney Christine Mark Keith Elyse Brandon Albert Semhar Stacey Mikayla Trojan Horse Dawn Coach
n20:
wowheadnews Buildings Building Main
n151:
Do not lose any health squares.
n113:
n114:
n97:wikiPageUsesTemplate
n98:
n43:
http://www.wowhead.com/news=226167/potential-trojan-account-threat-lfr-flex-and-the-group-finder-in-wod|desc=Potential Trojan Account Threat, LFR, Flex, and the Group Finder in WoD
n126:
2013-04-04
n245:
2011-10-26
n211:
Reach the French fortress at Castra Praetoria before sunrise, while leading the disguised mercenaries. Kill any French troops at checkpoints along the way before they raise the alarm.
n68:
upolu redemption savaii none
n136:
2
n172:
1
n220:
11.79
n123:
7
n177:
n223:
n8:
3.5
n107:
2 7
n163:
0
n3:
ID.219/2461.13
n141:
2000 2500
n15:
Savaii Upolu Redemption 14 15 18 16 17
n11:
Elyse Umemoto Ozzy Lusth Jim Rice Mark Caruso Semhar Tadesse Dawn Meehan Coach Wade Stacey Powell Whitney Duncan Keith Tollefson Sophie Clarke Albert Destrade Rick Nelson Mikayla Wingle Edna Ma John Cochran Christine Shields Markoski Brandon Hantz
n53:
n190:
n239:
n240:
n160:
n161: n166:
n193:
n194:
n246:
Rome,
n96:wikiPageDisambiguates
n180: n189:
n48:
Security Agent #1 - Patrick Boll Annoyed Executive - Jeffrey Schecter TOVO Networking Advisor - Asa Somers Donnie - Joey Auzene
n13:
Patrick Simmons - Robert John Burke Cal Beecher - Sterling K. Brown Raymond Terney - Al Sapienza Alonzo Quinn - Clarke Peters Samantha Shaw - Sarah Shahi n209: n222: Greer - John Nolan
n96:abstract
Trojan Horse (トロイノモクバ Toroi no Mokuba?) is the final boss of the game Rockman.EXE Legend of Network. It is a Trojan horse that was inside RideMan.EXE. In battle, the boss has 2000 HP. "Trojan Horse" is the 19th episode of season 2, and the 43rd produced hour of Person of Interest. It originally aired on April 4, 2013. The Trojan horse was, in the epic poem The Aeneid, a wooden horse presented as gift to the city of Troy during the Trojan War which, when brought inside the city gates, was discovered to hold Greek troops inside. Over time, the term "Trojan horse" has come to mean any seemingly benign object which holds a hidden threat or danger. The term is also used in computer programming, to describe a damaging program disguised as a non-dangerous one. (VOY short story: "A Taste of Spam") In 2370, Diaadul planted a "Trojan horse" program into the computers of Deep Space 9 that disabled the station's shields. (DS9 novel: Proud Helios) In 2371, the USS Defiant detected a stasis chamber floating in space near the Sreba. Sisko ordered the chamber to be transported aboard, but planned to send it back into space if it contained a "Trojan horse". It was later discovered that Heather Petersen was in the stasis chamber. (DS9 - Invasion! novel: Time's Enemy) T'Ryssa Chen was suspected of being a Trojan horse after being attacked by Borg, and then sent 2000 light years back to Federation space, seemingly unassimilated. (TNG novel: Greater Than the Sum) When the Geek's supreme banana - IBM - said "Let there be code.", every Programming Language was created. Then, he created one minor apple for each language, such as Java, Pascal, C, C+ and C++. But IBM wasn't a good banana at all. He explored the money of the geeks, made a law for a compulsory daily sacrifice of a virgin geek (which is not that hard to find...) and ordered the geeks to make Code prayers for his pleasure. After that, some of the Geek priests, unhappy with the extremely hard-doing desires of IBM, have gone to the "Dark Side of The Code" and created themselves a brand new orange, later called "The Trojan Horse" . The geeks wanted vengeance for the creation of IBM by the humans. Since then, more and more Geeks have been invoking the Trojan Horse to do malevolent things to humankind. The trojan horse was invented by Sony, the original trojan horse would turn you computer in to a brick if you put in a Sony music disk. NOTE: The Trojan Horse was removed from later versions of Fall from Heaven, as its main feature - the ability to not have your units pushed out of the border on a war declaration - was replaced by the Council of Esus's new ability. Ever since Odysseus ended ten years of futile war with a spot of carpentry, this has been one of the favourite tactics of clever characters faced with impregnable defenses. In the simplest version, the Greeks simply hide inside a object which they know the Trojans will be unable to resist picking up and taking inside their defenses. If the Trojans aren't complete idiots, subterfuge will be used to get them to accept the object -- anything from disguising it as a Trojan vehicle up to a full-blown Xanatos Roulette. Common variations include hiding a well-trained animal inside the Trojan Horse, or a computer program. In Speculative Fiction the Horse itself might be a robot or shape shifter. Whatever the details, the net result is the same. The Greeks get some of their agents inside the Trojans' walls, without the Trojans knowing they are there, which leaves the Greeks free to commit sabotage, assassinate the Trojan leader, or simply open the gate and let the rest of their friends in. This contrasts with such tropes as Trojan Prisoner, I Surrender, Suckers, and the nailfile-in-the-cake trick, because in those cases the Trojans do know the Greeks are there, and are trying, however sloppily, to guard them. Thus, the Greeks don't usually have the degree of free rein the Trojan Horse gambit gives them. It also contrasts with using similar tricks to smuggle inanimate objects inside the Trojan lines, typically poisons and explosives, since such objects can't make decisions. A Greek soldier, or even a well trained monkey, is adaptable. They can change plans in mid-stream, taking advantage of unexpected opportunities. Poison can't do that. Thus, a Trojan Horse allows many more narrative possibilities than do inanimate objects. Examples of Trojan Horse include: The Trojan Horse was a tactical device, a troop transport disguised as an example of constructed sculpture, a statue depicting an artistic rendition of a horse. The Trojan Horse was used on ancient Earth by the Greeks at the seige of Troy, during the Trojan War. (TOS novel: The Fearful Summons) Trojan Horse is a tale from the Trojan War about the subterfuge that the Greeks used to enter the city of Troy and win the war. The Greeks constructed a huge wooden horse, and hid a select force of men inside. The Greeks pretended to sail away, and the Trojans pulled the horse into their city as a victory trophy. That night the Greek force crept out of the horse and opened the gates for the rest of the Greek army, which had sailed back under cover of night. The Greeks entered and destroyed the city of Troy, decisively ending the war. Dr. Daniel Jackson compared the Scarab miniature naquadah bomb placed inside Cassandra to the Trojan Horse. (SG1: "Singularity") Eli and Brody had a dialog about Trojan Horse. (SGU: "Visitation") The main ancient source for the story is the Aeneid of Virgil, a Latin epic poem from the time of Augustus. The event is referred to in Homer's Odyssey. In the Greek tradition, the horse is called the "Wooden Horse" (Δούρειος Ἵππος, Doúreios Híppos, in the Homeric Ionic dialect). Metaphorically a "Trojan Horse" has come to mean any trick or stratagem that causes a target to allow a foe into a securely protected bastion or space. A malicious computer program which tricks users into willingly running it is called a "Trojan horse". Computer viruses and trojans are often confused with each other and often used interchangeably. While their effects can be similar they are different primarily in how they infect your computer. A trojan can infect your computer through any odd executable file you might have downloaded (for whatever reason), and these days even from an infected media file. This means the user has to actively run or load something to infect their computer. Most trojans are activated through some form of Social engineering scheme. A virus can infect a computer program by replicating itself sometimes without direct user interaction, but other times it works similarly to a trojan where the infection is spread via user interaction with an infected program. Once your computer is infected you run the risk that the code is sending your account data to the creator of the code as you type it or later in some preset upload, who might then steal your account information and claim it as his own. A Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk. In one celebrated case, a Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. The term comes from Greek mythology about the Trojan War, as told in the Aeneid by Virgil and mentioned in the Odyssey by Homer. According to legend, the Greeks presented the citizens of Troy with a large wooden horse in which they had secretly hidden their warriors. During the night, the warriors emerged from the wooden horse and overran the city. The Trojan Horse (Ancient Greek: Δούρειος Ἵππος/Doureios Hippos, meaning Wooden Horse) is a huge wooden construction, that appears in the Greek part of the Fall of the Trident campaign in Age of Mythology. In Greek mythology, the Greeks were besieging the city of Troy but could not break the Trojans' resistance. Then they built a huge wooden horse, in which they hid dozens of warriors. They gave it to the Trojans as a gift, which the Trojans accepted. Once inside the city, the warriors poured out of the horse and captured Troy. Named after the wooden horse from Greek mythology, a Trojan horse is a The Trojan Horse is an idol in the Walls of Troy multiplayer map and is the target for the Trojans team. The Spartans try to protect this while trying to destroy the Statue of Apollo. It also appears on the Troy background for the Combat Arena of God of War: Ghost of Sparta. A Trojan Horse is the nick-name given to Zodiac Boarding Craft, and, curiously, the name of the Bomb planted inside Troy Station.
Subject Item
n26:
n20:
n2:
Subject Item
n83:
n84:
n2:
Subject Item
n52:
n177:
n2:
n53:
n2: