This HTML5 document contains 594 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n298http://dbkwik.webdatacommons.org/resource/8gSlMiL7Lc-C3eiTknSeAQ==
n177http://dbkwik.webdatacommons.org/resource/eplGlM-vKsWNWI9lMAtk1A==
n188http://dbkwik.webdatacommons.org/resource/e2QDtylzxSM0UsV1_giXEQ==
n150http://dbkwik.webdatacommons.org/resource/UEPxjUMDLLEodC-yWyPt9w==
n270http://dbkwik.webdatacommons.org/resource/ec74x9Ea2Ka93KBfAMQttw==
dctermshttp://purl.org/dc/terms/
n321http://dbkwik.webdatacommons.org/resource/h_VqOMkaYnW448Z3Za3nTQ==
n475http://dbkwik.webdatacommons.org/resource/AZVLmxz2RMo5qJYPbW0Ysg==
n277http://dbkwik.webdatacommons.org/vocaloidlyrics/property/
n279http://dbkwik.webdatacommons.org/resource/di1Py0voVy3JFXhQQIWiKQ==
n56http://dbkwik.webdatacommons.org/resource/4nxCabH5iPLxUQO-o45CVA==
n31http://dbkwik.webdatacommons.org/resource/hOW0x9fqePIyGxAQ29t6XQ==
n461http://dbkwik.webdatacommons.org/resource/RCfALMf4tXdgBikSU8iSZg==
n6http://dbkwik.webdatacommons.org/ontology/
n313http://dbkwik.webdatacommons.org/resource/6cKEKQQ6qU6YjETSwv_6mg==
n254http://dbkwik.webdatacommons.org/resource/4yJG-N5XfRwmWYxFp2jz5A==
n478http://dbkwik.webdatacommons.org/resource/wDhZg06PwdvpKzgZ0hW1GA==
n350http://dbkwik.webdatacommons.org/resource/gbFa9BLpa4LHC-asKY2wKQ==
n249http://dbkwik.webdatacommons.org/resource/M5vI7w5aW043OSvLesWIVg==
n399http://dbkwik.webdatacommons.org/resource/LG5GAuPPbWM1GxQnh0XEtg==
n310http://dbkwik.webdatacommons.org/resource/NjFMEa55zUg1Wd4oJ97Ycw==
n262http://dbkwik.webdatacommons.org/matrixonline/property/
n491http://dbkwik.webdatacommons.org/resource/wtAYJxoJnXFvKSF4bwySxQ==
n488http://dbkwik.webdatacommons.org/resource/giw_nKhunqAOuqZeWrp2HQ==
n296http://dbkwik.webdatacommons.org/resource/XKZ7C48WUJkD102tsqaWTw==
n499http://dbkwik.webdatacommons.org/resource/UmAr_BeOAhj0u2l_8qDeDw==
n385http://dbkwik.webdatacommons.org/resource/t3Ha8mMs9IEdEF_VNtTwkg==
n503http://dbkwik.webdatacommons.org/resource/Y9VNOvpoQxFfeINxkjhwfg==
n344http://dbkwik.webdatacommons.org/resource/O9MT1dsC9kYa87K2NajIWA==
n255http://dbkwik.webdatacommons.org/resource/DMALC3o9nWMeFRIvaCU3BA==
n484http://dbkwik.webdatacommons.org/resource/Y8xgfvNftRDOVVq_MO6sqQ==
n472http://dbkwik.webdatacommons.org/resource/P7IbnYo8ama2nSN08Y3-9w==
n276http://dbkwik.webdatacommons.org/resource/ESTzGXIGvfRbHikWoLitEQ==
n449http://dbkwik.webdatacommons.org/resource/8s6evwQpNxS87NSsyn6ZKw==
n16http://dbkwik.webdatacommons.org/resource/vE_OvsJDtPK9JuuabwAXPg==
n174http://dbkwik.webdatacommons.org/resource/Vb_ZdFEPAIztKdMibuHtYA==
n39http://dbkwik.webdatacommons.org/resource/rT23OtQ7zsNcS6m7JD3alg==
n136http://dbkwik.webdatacommons.org/resource/ho7gOC_bTt2hE7uzZ-vTTQ==
n527http://dbkwik.webdatacommons.org/resource/J6QMWDTgCCvunNnLV5ZgaA==
n390http://dbkwik.webdatacommons.org/resource/tFjGljRd3fTH6mGP5v7Tng==
n58http://dbkwik.webdatacommons.org/resource/iRWd5zIyBI8Ex5u4jzKRuA==
n524http://dbkwik.webdatacommons.org/resource/vO3M5KViiF8GEvHNonw7tw==
n452http://dbkwik.webdatacommons.org/resource/VPNibbk-t2r1dxSYeWX3hg==
n271http://dbkwik.webdatacommons.org/resource/mKbDYg5LYDkYDJgoymHkDQ==
n189http://dbkwik.webdatacommons.org/resource/IaHRyVXZzOQWGlChhDs2pQ==
n265http://dbkwik.webdatacommons.org/resource/LEzfXnBr06S-WD1j_S4ObQ==
n325http://dbkwik.webdatacommons.org/sims/property/
n122http://dbkwik.webdatacommons.org/dead--rising/property/
n346http://dbkwik.webdatacommons.org/resource/byI6Uv3Inl0Pob4cvj2ISw==
n306http://dbkwik.webdatacommons.org/resource/Ct5bRMvTHv9dmdWmZ1ZgKA==
n495http://dbkwik.webdatacommons.org/resource/6oiLiW6JQ_o2GuMVPXEs2Q==
n65http://dbkwik.webdatacommons.org/resource/TdVZBIow6wjuDsXfa9NsXA==
n274http://dbkwik.webdatacommons.org/resource/Z7kcEznRL2wKKcXrdeLM5A==
n511http://dbkwik.webdatacommons.org/resource/8o1p8DBc7tTqR4sOpNWJXA==
n42http://dbkwik.webdatacommons.org/resource/EBTk8fB32gpdlsr7xXF73Q==
n9http://dbkwik.webdatacommons.org/resource/nMBnq44pyCIiVk4Xq3MdGA==
n258http://dbkwik.webdatacommons.org/resource/XX_9j7OgTrsFs3XZ-NlyJg==
n21http://dbkwik.webdatacommons.org/conworld/property/
n404http://dbkwik.webdatacommons.org/resource/Rii6rDtzzXrqwWYFtjphpw==
n420http://dbkwik.webdatacommons.org/resource/ydr5arqHhS0KrAaaERl_0Q==
n96http://dbkwik.webdatacommons.org/resource/kD7NfzHMab0LlcDCrCs87g==
n476http://dbkwik.webdatacommons.org/resource/bezxUXkJr0jIel_QKpK9pw==
n139http://dbkwik.webdatacommons.org/resource/J9wcDGTPOrHzJMVhK_VS8A==
n284http://dbkwik.webdatacommons.org/resource/1GdR2VFph06bHgHn6Jatmg==
n517http://dbkwik.webdatacommons.org/resource/0hrkG5AttcDoxnCAbklsFg==
n70http://dbkwik.webdatacommons.org/resource/DQWyK7ScBO5DAlzKZ_0g1w==
n506http://dbkwik.webdatacommons.org/resource/XXTuS9XFoVJWkmxS3FYpSQ==
n131http://dbkwik.webdatacommons.org/resource/PB7TuHBbzU5_Tz62kxG5cw==
n353http://dbkwik.webdatacommons.org/resource/sK5zGfMCJyFi_lSLz5YOeA==
n232http://dbkwik.webdatacommons.org/resource/RUbNp31H_JjfY7TntyX6cA==
n129http://dbkwik.webdatacommons.org/resource/btWGDtaman5HwI0FMFgtHg==
n513http://dbkwik.webdatacommons.org/resource/OSkVrz2Loi_2FScrjscmtg==
n47http://dbkwik.webdatacommons.org/resource/3UV2vljEPINKB4mAnRTG6A==
n106http://dbkwik.webdatacommons.org/resource/69iLYQLo03-S-12CsOV_-w==
n373http://dbkwik.webdatacommons.org/resource/lF5FBpyv0bHiRVZoATNW5g==
n275http://dbkwik.webdatacommons.org/resource/NtaiZObhIb5uKn3-MIQ07w==
n209http://dbkwik.webdatacommons.org/resource/ZqFqTPEqclIopcRUBXEZAg==
n391http://dbkwik.webdatacommons.org/resource/nniwE-uiaunzKYVq4ZNAyg==
n216http://dbkwik.webdatacommons.org/resource/26LobBR7mjXHcEc5pZTJyQ==
n394http://dbkwik.webdatacommons.org/resource/8Q2plRPJ-586JURcHW5d8g==
n68http://dbkwik.webdatacommons.org/resource/-N_VCveVvrmxwGxIwTKu6g==
n407http://dbkwik.webdatacommons.org/resource/sY_f7e71lnwCT_T_KecHCQ==
n371http://dbkwik.webdatacommons.org/resource/u5OYCtpsxJeGinHREPQv3Q==
n85http://dbkwik.webdatacommons.org/resource/zXJH7-3NS2TLQgBDiEN8CQ==
n266http://dbkwik.webdatacommons.org/resource/cBVT_pe9sycYMUhfEQCpkA==
n154http://dbkwik.webdatacommons.org/resource/DkykKe_NTFESJGHgme4U3Q==
n311http://dbkwik.webdatacommons.org/sonsofanarchy/property/
n38http://dbkwik.webdatacommons.org/resource/_jKGOv9tX0GDSrwteODk9g==
n319http://dbkwik.webdatacommons.org/resource/I_mK_y24cWAHPQZI_jRi8w==
n36http://dbkwik.webdatacommons.org/resource/mUhojaiht2VnaejNvGL2OQ==
n348http://dbkwik.webdatacommons.org/resource/bygaH1fDsi2_AovykEnZ7Q==
n356http://dbkwik.webdatacommons.org/resource/v0q8BP6slaLrmVR1c_iuUw==
n467http://dbkwik.webdatacommons.org/crystalhall/property/
n438http://dbkwik.webdatacommons.org/resource/ijzgX8xhuXqgAPxZwR6mAQ==
n509http://dbkwik.webdatacommons.org/resource/MC8Ajno1cZPe7Tc4Q8SAkg==
n456http://dbkwik.webdatacommons.org/resource/YEqyvUmEuxbeE_lVGJGqiQ==
n32http://dbkwik.webdatacommons.org/malware/property/
n110http://dbkwik.webdatacommons.org/fallout/property/
n427http://dbkwik.webdatacommons.org/resource/eb54e9WlMpNYPwVsw-aGdA==
n287http://dbkwik.webdatacommons.org/resource/ZKH_LGeCW_JPBrfMINdU-Q==
n487http://dbkwik.webdatacommons.org/resource/S3xMRVMGbdX8KDM_2XWd5A==
n105http://dbkwik.webdatacommons.org/enciclopedie/property/
n212http://dbkwik.webdatacommons.org/de.ffxiclopedia/property/
n143http://dbkwik.webdatacommons.org/resource/71obzpCT5qDyhaVGln6zsg==
n230http://dbkwik.webdatacommons.org/resource/FbzSgaG1n1hsZx69LZI2KQ==
n208http://dbkwik.webdatacommons.org/deadrising/property/
n380http://dbkwik.webdatacommons.org/resource/tLQDnf2y-SU679afr_qs1Q==
n114http://dbkwik.webdatacommons.org/resource/nUUctcmIx536gKM0vHJplw==
n468http://dbkwik.webdatacommons.org/resource/Gc00nhRnzLYluAAwKGak7w==
n431http://dbkwik.webdatacommons.org/resource/IGL5CdTm2-IyagWQSA8bWg==
n126http://dbkwik.webdatacommons.org/resource/iL3iNSGfcLHBaZIhGQcdAQ==
n288http://dbkwik.webdatacommons.org/resource/7qhRt4_91aCxMuZXH7DT2Q==
n338http://dbkwik.webdatacommons.org/resource/09Lquj5I4hrRLQOTx8mqxw==
n245http://dbkwik.webdatacommons.org/resource/hKvusaUDlkE_eVkouN1lVQ==
n171http://dbkwik.webdatacommons.org/resource/YhzY54hlMB0Hmr9QlAFixw==
n117http://dbkwik.webdatacommons.org/resource/RiaMY-W7ua567zJeXjY1LA==
n55http://dbkwik.webdatacommons.org/resource/vGZ9p5Thto1vewfSP_DLFQ==
n341http://dbkwik.webdatacommons.org/resource/rvfTGiYeBnx4DiQCbhKmFw==
n89http://dbkwik.webdatacommons.org/resource/R4HtxAZ6-RvVSaOREolP9g==
n442http://dbkwik.webdatacommons.org/resource/td5kJ42gfK4_IZu1bmmdvA==
n360http://dbkwik.webdatacommons.org/resource/yP5-kpLhZTpAX1aPzYjSGA==
n366http://dbkwik.webdatacommons.org/resource/v0c2Rect5POMOto0lMCcLA==
n43http://dbkwik.webdatacommons.org/resource/m5268hoCy0FopVdhvAYd7w==
n377http://dbkwik.webdatacommons.org/sonic/property/
n218http://dbkwik.webdatacommons.org/resource/kUUd6YrdCvxOu8OW68PMKw==
n530http://dbkwik.webdatacommons.org/resource/z7ia9LgyTjYbtxARHBMLcg==
n469http://dbkwik.webdatacommons.org/resource/_aqq8va4GBhY-sNU82urew==
n383http://dbkwik.webdatacommons.org/resource/R6_ck8x4VouzPsCwIBLbCQ==
n153http://dbkwik.webdatacommons.org/resource/FfBvBRaJuqzDwL8p_cqh_g==
n492http://dbkwik.webdatacommons.org/resource/PmZay_pA85VyH0du6MThdA==
n329http://dbkwik.webdatacommons.org/resource/9ab-I51cvLZxC4OsGLl1nQ==
n500http://dbkwik.webdatacommons.org/resource/mLUzBL9oPlmj1Obmq0AWkQ==
n471http://dbkwik.webdatacommons.org/resource/Co0wRp0Snr8wsFbluz3IpA==
n34http://dbkwik.webdatacommons.org/es.starwars/property/
n400http://dbkwik.webdatacommons.org/resource/n1dshzWbEcgUMF4aWXL83w==
n30http://dbkwik.webdatacommons.org/digimon/property/
n35http://dbkwik.webdatacommons.org/resource/XTlyxS8DYDOnfS3USmKsdQ==
n490http://dbkwik.webdatacommons.org/resource/h6uZieqBFLL9CPdjHf6e_g==
n224http://dbkwik.webdatacommons.org/resource/lJklYtDJaHWwJ-T3x2x_iw==
n418http://dbkwik.webdatacommons.org/resource/l2cQCsAINzGe80RM27gkaA==
n363http://dbkwik.webdatacommons.org/resource/jzcEmcdXknZvkgkoU16SKw==
n483http://dbkwik.webdatacommons.org/resource/UWgSQqw_qDbsaSGrDBXE2Q==
n51http://dbkwik.webdatacommons.org/resource/x9H2pkhiCf2A7qf4hRnSjw==
n238http://dbkwik.webdatacommons.org/resource/yD2HrMV6Txv11lTu6_VfMw==
n25http://dbkwik.webdatacommons.org/ratchetandclank/property/
n320http://dbkwik.webdatacommons.org/resource/0l0gbVTRqp_1bB8X7RI1Ag==
n186http://dbkwik.webdatacommons.org/resource/071e6SjTuCXXDqk7BtwB_w==
n141http://dbkwik.webdatacommons.org/de.gta/property/
n142http://dbkwik.webdatacommons.org/resource/jWCgcfG-ZxWc6OA2hKfbfg==
n379http://dbkwik.webdatacommons.org/resource/2VUT3LmKVerEtb_rpK_BHQ==
xsdhhttp://www.w3.org/2001/XMLSchema#
n269http://dbkwik.webdatacommons.org/resource/HgOiaUBIGds8kONcCnQNPA==
n501http://dbkwik.webdatacommons.org/resource/2wfF0KYLa4m2TMrFN5mPjA==
n163http://dbkwik.webdatacommons.org/resource/m7bRxRvIdbhLNWV1BXoyVw==
n518http://dbkwik.webdatacommons.org/resource/f7UyjHQnPKAipy0_ymGolA==
n443http://dbkwik.webdatacommons.org/resource/tsm957QXj0KKnifayYdQ1w==
n107http://dbkwik.webdatacommons.org/resource/Y_Yw8gSKpQs4410ynkd-aQ==
n474http://dbkwik.webdatacommons.org/resource/uOilHARbea3kU9v8ZHru7A==
n290http://dbkwik.webdatacommons.org/resource/Q0F1FDMVwD51y1UyOZMSsA==
n305http://dbkwik.webdatacommons.org/resource/cmqq_6V5pjWOBFeqzQXs8g==
n205http://dbkwik.webdatacommons.org/resource/mrDznTKFsk9V0UFZMpyvPg==
n57http://dbkwik.webdatacommons.org/resource/cLJ64O0WUJP2-qhJ0aeOAg==
n75http://dbkwik.webdatacommons.org/resource/Kvpys5yTDBj6LFQaOYMezw==
n40http://dbkwik.webdatacommons.org/resource/3d7bvZe11LPvd_hyVbLaYQ==
n210http://dbkwik.webdatacommons.org/resource/O-iiZBsdABhYClypogPTaQ==
n95http://dbkwik.webdatacommons.org/resource/_9plbYLWjQnhTYh4dHR9hw==
n125http://dbkwik.webdatacommons.org/resource/rF005yJFmUNbqvytjElfRA==
n347http://dbkwik.webdatacommons.org/resource/t3n-6jrHu8Pf40BgKN1K2g==
n283http://dbkwik.webdatacommons.org/resource/Pvh6tsch2eaC_5GvmQF7Og==
n226http://dbkwik.webdatacommons.org/resource/zAjQPLx4EVUlzjrAvvVuRA==
n446http://dbkwik.webdatacommons.org/resource/pW0db-qr-8PAzlZxHV5bzg==
n405http://dbkwik.webdatacommons.org/resource/Kt3U3LOdacFco3-w__MbwA==
n229http://dbkwik.webdatacommons.org/resource/oJlsoOVZw9WJxDrQ6YZenA==
n382http://dbkwik.webdatacommons.org/resource/JQ-CrvXXlctJ9TkLJFzpoA==
n316http://dbkwik.webdatacommons.org/resource/hXPOBT9qa-ts-BzqNbmCyA==
n221http://dbkwik.webdatacommons.org/resource/cV0zXcpR5C26PevAI5qupw==
n48http://dbkwik.webdatacommons.org/resource/L_BjN4cPQdUlMd3Ps898WA==
n45http://dbkwik.webdatacommons.org/resource/WUm7_ZVicT1TXK9-PkUS6Q==
n256http://dbkwik.webdatacommons.org/resource/mn-e1hIIRftYxw6AnFC0jg==
n473http://dbkwik.webdatacommons.org/resource/6vi8uYPgyAPCa6HCtmqo8g==
n223http://dbkwik.webdatacommons.org/resource/Vh-LRT572pUZNgwO7TA2dw==
n301http://dbkwik.webdatacommons.org/resource/SG073hJCW7Ezs1n_t_JqLg==
n259http://dbkwik.webdatacommons.org/resource/Rhq6I8rtQBcYEExaiDc-Ww==
n304http://dbkwik.webdatacommons.org/resource/byb6HP9FZc6EOdtvYzt-Gg==
n161http://dbkwik.webdatacommons.org/tfumux/property/
n231http://dbkwik.webdatacommons.org/resource/1UV9ieR2MVsrcR-VnuX1Cg==
n516http://dbkwik.webdatacommons.org/resource/jrbs4cRaiR0ABiRaJ1CkLA==
n419http://dbkwik.webdatacommons.org/resource/kyKMVo7TU-b8q9oRcfkThQ==
n278http://dbkwik.webdatacommons.org/resource/x7WgEVVe38nacgi6Zt6NkQ==
n191http://dbkwik.webdatacommons.org/toontown/property/
n233http://dbkwik.webdatacommons.org/resource/v_snIfZDJob9r203Cn_BMA==
n213http://dbkwik.webdatacommons.org/resource/7nzQixmUgk5_gwZE3070Sg==
n417http://dbkwik.webdatacommons.org/resource/cXR16GzESuFJbp0tEtlumQ==
n193http://dbkwik.webdatacommons.org/resource/uD7yi0IZRyXZKZTaUEGuBg==
n508http://dbkwik.webdatacommons.org/resource/_wfXDGQYR0o3hgma-fa30w==
n398http://dbkwik.webdatacommons.org/resource/w8U4rdWBcASmJuovDxvZgQ==
n44http://dbkwik.webdatacommons.org/resource/uidBqlmLLsJzroR8QSmLyg==
n119http://dbkwik.webdatacommons.org/resource/LSCgMYmF8tZtAXHaJPAg9w==
rdfshttp://www.w3.org/2000/01/rdf-schema#
n440http://dbkwik.webdatacommons.org/resource/VpLVSWTj_PWnYo-Z61vJpQ==
n299http://dbkwik.webdatacommons.org/resource/KCFrzX1qXuXe7l3rFh0jug==
n178http://dbkwik.webdatacommons.org/resource/bQavUbO6emwUZMIRNPXbBg==
n357http://dbkwik.webdatacommons.org/resource/LWQ-PRJ0Ftpu0-JeQijyhg==
n144http://dbkwik.webdatacommons.org/resource/eXhxlF969rL4cPKzjsspFw==
n201http://dbkwik.webdatacommons.org/resource/pBJti7AEhNEWdMeTd2maBQ==
n240http://dbkwik.webdatacommons.org/resource/VfcQjSMyuhuHUXatnE3XHg==
n69http://dbkwik.webdatacommons.org/resource/751CochHsLNHdMg-xNUSvA==
n239http://dbkwik.webdatacommons.org/legogames/property/
n454http://dbkwik.webdatacommons.org/resource/3IiXbtoLVRdi6LYDT7f7aQ==
n198http://dbkwik.webdatacommons.org/resource/9GcDonQ32xUCEW_n9x3lPg==
n453http://dbkwik.webdatacommons.org/resource/9N4NVVGdk_chyuYI6bvb4w==
n170http://dbkwik.webdatacommons.org/resource/mAk6_YiXfJ5k-WFAP4X_Ew==
n160http://dbkwik.webdatacommons.org/resource/U0c5SKvmAZxlASTt3DWBcQ==
n428http://dbkwik.webdatacommons.org/resource/NdlxaBRIgqLWo8NrVd40Sg==
n397http://dbkwik.webdatacommons.org/resource/VEy-iJ-8-RnPVvthRCSA_A==
n194http://dbkwik.webdatacommons.org/resource/m1b0pAtRrx5BiJwPfTKfCw==
n261http://dbkwik.webdatacommons.org/resource/o13rWVqeSy0RTSjD-LH8VQ==
n340http://dbkwik.webdatacommons.org/resource/8czFMlAp2iAU1Az97Mkp0g==
n448http://dbkwik.webdatacommons.org/resource/0xMLPrvxdxJzYBbG-nfFXg==
n78http://dbkwik.webdatacommons.org/resource/99XjEfSF2VC16CqrVFsLZA==
n3http://dbkwik.webdatacommons.org/resource/48wUGHN_wQ8gR1PtAF5G-A==
n18http://dbkwik.webdatacommons.org/resource/bSvsiusn-JSaBFnF7YVdsQ==
n227http://dbkwik.webdatacommons.org/resource/WhJisWQdgOfxAU2gp9XdJw==
n86http://dbkwik.webdatacommons.org/resource/VO1zrZDBlZWs6vsct09JqQ==
n14http://dbkwik.webdatacommons.org/resource/fA1nSe4PSd_pLCbsdcX2Vw==
n369http://dbkwik.webdatacommons.org/resource/x05l1YcyVcSefOwSTWq3BQ==
n234http://dbkwik.webdatacommons.org/de.uncyclopedia/property/
n195http://dbkwik.webdatacommons.org/resource/9uq2VdR5kx5YdnlH12DMGA==
n315http://dbkwik.webdatacommons.org/resource/sv_mAPWCaWzTeMWvH0CARA==
n403http://dbkwik.webdatacommons.org/resource/Bnp7djDYNYzm73w0U9sXmg==
n395http://dbkwik.webdatacommons.org/resource/gFfVMag6Vx5EUX3hIBOfog==
n33http://dbkwik.webdatacommons.org/resource/7EMrTGtbNeiE2vyd6KpkGw==
n17http://dbkwik.webdatacommons.org/fr.starwars/property/
n251http://dbkwik.webdatacommons.org/resource/gL-Olh87eoZ0oi3laL5X-Q==
n450http://dbkwik.webdatacommons.org/resource/pOZ5plfcVuyVC0AOWcmx-Q==
n172http://dbkwik.webdatacommons.org/resource/mpyo2R1tF0X8XiIBMwmlPg==
n41http://dbkwik.webdatacommons.org/resource/ozbTsmOUDgIKVOyh-IdtiA==
n465http://dbkwik.webdatacommons.org/resource/msZuPpBnyy-mCrgSoctVig==
n112http://dbkwik.webdatacommons.org/resource/-gbbDEB2KLKjUppwRkd78A==
n297http://dbkwik.webdatacommons.org/resource/TkO6OjZAkpP7HdZMJq2BSQ==
n190http://dbkwik.webdatacommons.org/resource/N-alDlWzYPHtHYAfZ7jvwQ==
n133http://dbkwik.webdatacommons.org/resource/2NNYSVCM-z4Jccw8botKeQ==
n187http://dbkwik.webdatacommons.org/resource/klB_SAIsFkiP8MLh_RXmlA==
n433http://dbkwik.webdatacommons.org/resource/ORCDXfc1NgIGp94jSaNsLw==
n199http://dbkwik.webdatacommons.org/resource/pwGYN7fNcAKvdoGi53cfVQ==
n20http://dbkwik.webdatacommons.org/resource/UQaCqe_tRI3sjr1OKxzCFQ==
n458http://dbkwik.webdatacommons.org/resource/gENZalaX0SdPvpR0mOHFog==
n336http://dbkwik.webdatacommons.org/resource/zEKE6mvUPPpCamUMt6SXUA==
n26http://dbkwik.webdatacommons.org/resource/soQxEVFkBoaBHzqWBLdpLg==
n522http://dbkwik.webdatacommons.org/resource/9XTQWUIrizcR4JWFOO43jw==
n455http://dbkwik.webdatacommons.org/resource/4U9Y5ng2fWX5s2s2tCHRGA==
n307http://dbkwik.webdatacommons.org/resource/yNmpn3rxXrkA3yNudfU9Bg==
n260http://dbkwik.webdatacommons.org/resource/RbphHQPeIOGhA_7bqD9_5g==
n81http://dbkwik.webdatacommons.org/resource/0yBoeWt9qDKpvrY3ctuMHQ==
n156http://dbkwik.webdatacommons.org/resource/6f3-8P6yYH9voy_YDegOjw==
n162http://dbkwik.webdatacommons.org/resource/bepSgKgMc5IVhVIq8XmZeg==
n46http://dbkwik.webdatacommons.org/resource/HcMTqu5ZYzPboUhsJHZyAA==
n437http://dbkwik.webdatacommons.org/resource/dxRuFnkPglvXSzIp-C3ZnA==
n73http://dbkwik.webdatacommons.org/resource/BjThyczMZ8R-CIAqW7W9vg==
n182http://dbkwik.webdatacommons.org/resource/QOiHI65D1hgrGLRWDIQNKw==
n79http://dbkwik.webdatacommons.org/resource/e7gFwERQ3o0m8y_Sh7I9PA==
n19http://dbkwik.webdatacommons.org/resource/7KSlKxTF9kQydpJ_A9CsjA==
n149http://dbkwik.webdatacommons.org/resource/U8bYiSFKGa7r7ihHNvvHHw==
n375http://dbkwik.webdatacommons.org/resource/z35GS3ra6Ca55ZHi6RqnAQ==
n525http://dbkwik.webdatacommons.org/resource/nbXLSXKrBcZJiNGU3T7YsA==
n415http://dbkwik.webdatacommons.org/resource/NWejT2BOCH-YUhUjNRXCyg==
n521http://dbkwik.webdatacommons.org/resource/etkM60C4vLH_bS8vODZasQ==
n220http://dbkwik.webdatacommons.org/resource/vYkQXus_audG_nY_aJOS8Q==
n37http://dbkwik.webdatacommons.org/resource/wf-_d-Rmh_vSVzpHlvYAZQ==
n466http://dbkwik.webdatacommons.org/resource/rwwPULHoBK5HGuUuRYgtTQ==
n355http://dbkwik.webdatacommons.org/resource/y4ltm58Bo1tKq10hjEnKFA==
n444http://dbkwik.webdatacommons.org/resource/g4gYkNJcykU3xrs26SIm0A==
n342http://dbkwik.webdatacommons.org/resource/YDjiDRtibevjaOA_kmH5EA==
n368http://dbkwik.webdatacommons.org/resource/OpVivZJNWPXKiOffnfxY8w==
n101http://dbkwik.webdatacommons.org/resource/lITo8__V-CQFnYkZDu7PmQ==
n146http://dbkwik.webdatacommons.org/universeatwar/property/
n204http://dbkwik.webdatacommons.org/resource/KJSgh2Ffds14Ne_RZLlpOQ==
n157http://dbkwik.webdatacommons.org/resource/Ht31zQeoNxuaju0TT9uNNA==
n113http://dbkwik.webdatacommons.org/resource/TGVw_48bfxR4O_s_eW_eZQ==
n243http://dbkwik.webdatacommons.org/resource/JrAYYyy1uZo-932oRd89ZQ==
n237http://dbkwik.webdatacommons.org/resource/sNVBqUg5hUEXYH-W6cN6LQ==
n447http://dbkwik.webdatacommons.org/resource/XxR3epj4RlB_PX5BQ8kYzg==
n426http://dbkwik.webdatacommons.org/resource/-F5QeGLIivf5Q1Viz6RcIQ==
n416http://dbkwik.webdatacommons.org/resource/ytBzAIwrfx_6ib5GJjiAeQ==
n486http://dbkwik.webdatacommons.org/resource/RTpM5uORzmesnMqKoJBELA==
n196http://dbkwik.webdatacommons.org/resource/9jkxzFXKMiSrZxGpFoSAOw==
n214http://dbkwik.webdatacommons.org/resource/2VyhGyJHC5FJBw7mMSQXAw==
n361http://dbkwik.webdatacommons.org/resource/v4mlx-PG4hBwTREsvcMTuw==
n27http://dbkwik.webdatacommons.org/resource/U5C8AmPJk9LYNi36CBkFVA==
n362http://dbkwik.webdatacommons.org/resource/y7U5iOtX9kkodPkGC_4-lw==
n166http://dbkwik.webdatacommons.org/resource/EL9fN9GGIcitGeq_-XnDdQ==
n228http://dbkwik.webdatacommons.org/resource/VxoUl76tCjjJXXEsSj2kcw==
n339http://dbkwik.webdatacommons.org/resource/Ob_F_dS6hLxK5nABy2_LCw==
n496http://dbkwik.webdatacommons.org/resource/XVXlVR-0Ww1InrJcyurEag==
n432http://dbkwik.webdatacommons.org/resource/eVPmAEFS0ZjSoNKzI_SVrw==
n334http://dbkwik.webdatacommons.org/resource/G903e8w8H13T2gx6Hm_0eQ==
n504http://dbkwik.webdatacommons.org/resource/DMCeES9J_7UEPWDKoSoa-g==
n358http://dbkwik.webdatacommons.org/resource/C_70FaP3wLJH1MGg_jna0A==
n464http://dbkwik.webdatacommons.org/resource/X60OVtVXA-vJiG2zVRBSrA==
n323http://dbkwik.webdatacommons.org/resource/SDuXWq4s1Ww8DQhVsk6M7w==
n273http://dbkwik.webdatacommons.org/resource/C-1l_0W_HkQT6oFP4lslbg==
n97http://dbkwik.webdatacommons.org/resource/dX617woPuKK2JFqahMTqFg==
n352http://dbkwik.webdatacommons.org/resource/6YH7VxAZDXsr6SwRbBiHKg==
n102http://dbkwik.webdatacommons.org/resource/kQU-Zoier0zFOJ1kYs_PYw==
n241http://dbkwik.webdatacommons.org/resource/9B_8LpURFYBcHdm-zKIUyA==
n520http://dbkwik.webdatacommons.org/resource/5YwANKKTRgyW5TM71FRm1A==
n531http://dbkwik.webdatacommons.org/resource/3BxqybOoRZT9YbucD33iaA==
n176http://dbkwik.webdatacommons.org/es.digimon/property/
n515http://dbkwik.webdatacommons.org/resource/xEo1bXrjg2jQlwz_7Srt3w==
n489http://dbkwik.webdatacommons.org/resource/hOk98i-YO8Yo-6gTku0u2g==
n236http://dbkwik.webdatacommons.org/resource/Uvh53lg3bvx7UbTeybfFYg==
n222http://dbkwik.webdatacommons.org/resource/wA9sZ8WZUmAfoNstY_G_xg==
n480http://dbkwik.webdatacommons.org/resource/LCQn0y9kBrqKHTywo8OznA==
n192http://dbkwik.webdatacommons.org/resource/UftTClS3JgZgCwGQXPaWpA==
n88http://dbkwik.webdatacommons.org/scream/property/
n116http://dbkwik.webdatacommons.org/resource/GFwG6WjN3uFuGwbUnzzxdA==
n367http://dbkwik.webdatacommons.org/resource/1LT3J13FCt4RZADvood6aA==
n52http://dbkwik.webdatacommons.org/resource/BHMk6j5OGhA2UypIFOhWEQ==
n151http://dbkwik.webdatacommons.org/resource/lSmu-cxyZTRSLdlauJTvSQ==
n11http://dbkwik.webdatacommons.org/resource/26Am-0aUuAStK21OKVZXQA==
n421http://dbkwik.webdatacommons.org/resource/41ZM-Adglhx_xLg6EXp9gQ==
n370http://dbkwik.webdatacommons.org/resource/UEBySBm30qIsS0jlwqndkg==
n74http://dbkwik.webdatacommons.org/comunidad/property/
n324http://dbkwik.webdatacommons.org/resource/zf38wApCWuaXdUR7VUIeEw==
n5http://dbkwik.webdatacommons.org/resource/mZX6BqdEKmAdAL6gWR5hiQ==
n92http://dbkwik.webdatacommons.org/resource/RhBRrRfoHs9Z1CRmShFemA==
n15http://dbkwik.webdatacommons.org/resource/qEv-ifmrmjSNP3OQDZ0jQw==
n335http://dbkwik.webdatacommons.org/resource/UnDipahpDqhUBQHIT-NMRQ==
n510http://dbkwik.webdatacommons.org/resource/iCmJ5YGFQJP7BkK2eLlhDg==
n272http://dbkwik.webdatacommons.org/resource/_PUZdFrakTJN3InXeG959w==
n87http://dbkwik.webdatacommons.org/resource/DJ17C1ZcQJ1q4_vZ_FvbBA==
n292http://dbkwik.webdatacommons.org/resource/aK2RxYifaO7lqtslLVb6NQ==
n91http://dbkwik.webdatacommons.org/resource/yfk3LrCzz5-Q18OOC5Bqjw==
n152http://dbkwik.webdatacommons.org/nonciclopedia/property/
n445http://dbkwik.webdatacommons.org/resource/n6j7gGxpQDiTYsuPJ6Veiw==
n285http://dbkwik.webdatacommons.org/resource/HLG0kO8SXDVtW6aj3CO6jg==
owlhttp://www.w3.org/2002/07/owl#
n387http://dbkwik.webdatacommons.org/battlefield/property/
n378http://dbkwik.webdatacommons.org/resource/r1uw8Ri713gs9rm7TZS8gw==
n434http://dbkwik.webdatacommons.org/resource/1YCPufAAuUdfRvuaiuak7w==
n441http://dbkwik.webdatacommons.org/resource/g2d5Tpia2QM5VwqV5fnzlg==
n247http://dbkwik.webdatacommons.org/resource/ey26to6cErrR1qG52FBgTw==
n83http://dbkwik.webdatacommons.org/resource/xaGTE1AMXinpmyY6QHVOZA==
n211http://dbkwik.webdatacommons.org/resource/yaUrhRueRLAHlJRxGOV9uw==
n62http://dbkwik.webdatacommons.org/resource/4bPxSMOAeizJJhtswNtnuA==
n61http://dbkwik.webdatacommons.org/resource/8ZvyLgHw5qEwKhXIjau8yA==
n523http://dbkwik.webdatacommons.org/resource/WGeegpUA6BxRRKND7eEMUQ==
n147http://dbkwik.webdatacommons.org/resource/DM5yNBPEHMSDmJglXsD1xQ==
n80http://dbkwik.webdatacommons.org/wackypedia/property/
n413http://dbkwik.webdatacommons.org/resource/_o1d8JCZEt2gX3mMzD8FxA==
n312http://dbkwik.webdatacommons.org/resource/uY9jHc4KoMWEA2VDHd2low==
n202http://dbkwik.webdatacommons.org/resource/KmAgqP5XdJL-MTZhNVL9oA==
n164http://dbkwik.webdatacommons.org/resource/WUpiNF5yxcXVP3W2GosXgg==
n54http://dbkwik.webdatacommons.org/resource/gUFyNrN0KxwTYCv72nq4wA==
n165http://dbkwik.webdatacommons.org/resource/bvIj7esxFtsEr88zav3Pbw==
n364http://dbkwik.webdatacommons.org/resource/OuqnFlbAvL23w-ty6qySkQ==
n183http://dbkwik.webdatacommons.org/resource/_SRwebc_BHxNY5JDTYvC5w==
n300http://dbkwik.webdatacommons.org/resource/JZK7RwE-9uTp7P-hk7qJrA==
n359http://dbkwik.webdatacommons.org/resource/NsFWFy85EFAC-4aYeY7fPQ==
n53http://dbkwik.webdatacommons.org/es.star-wars/property/
n140http://dbkwik.webdatacommons.org/resource/_dKh36hUaLQPQZD6HSCUyg==
n137http://dbkwik.webdatacommons.org/resource/GMn0fhrPqmcs2BJQ--3xgA==
n132http://dbkwik.webdatacommons.org/resource/-f7GIcSIaeDqZh8qm0EMTg==
n264http://dbkwik.webdatacommons.org/resource/-amSaYlgTl4CJFpD0O_wpA==
n215http://dbkwik.webdatacommons.org/resource/m-bHa3knykovxW1FGm_1yg==
n460http://dbkwik.webdatacommons.org/resource/AV_3GWa7-hY4XFNZM44CaA==
n90http://dbkwik.webdatacommons.org/resource/Te5QHe6-qqz8tAII0jE4Kw==
n333http://dbkwik.webdatacommons.org/resource/Aq47PGgJWDZ-N74TDw__mw==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n374http://dbkwik.webdatacommons.org/resource/HF6SsfJWP-xWTDd8LIWT_g==
n372http://dbkwik.webdatacommons.org/resource/TjGEKRnIPYXD9GMecsgOmg==
n71http://dbkwik.webdatacommons.org/resource/_lkJbCcr0BpUK5mr1r6TgQ==
n289http://dbkwik.webdatacommons.org/inazuma-eleven/property/
n502http://dbkwik.webdatacommons.org/resource/7FDFBfoIzZmzw_l9xxuFXg==
n257http://dbkwik.webdatacommons.org/resource/4CANTCcStwGl7uKB6kUfQw==
n409http://dbkwik.webdatacommons.org/resource/deSlr7NK4EmGqT-DIeJAtQ==
n294http://dbkwik.webdatacommons.org/resource/1AVyu57JAu-rSWtgg1iGrQ==
n528http://dbkwik.webdatacommons.org/resource/oHGRYPyl529-488BD-7daQ==
n485http://dbkwik.webdatacommons.org/shadowrun/property/
n60http://dbkwik.webdatacommons.org/resource/oCvWe2a8LswbfJHphQzAuQ==
n207http://dbkwik.webdatacommons.org/resource/8CnBCtcY2T2VaDTdIQucaQ==
n422http://dbkwik.webdatacommons.org/resource/IB7oHfrHb717pl3LtXoTsQ==
n389http://dbkwik.webdatacommons.org/resource/3H3CLaA0wmCOGuY31Bujfg==
n181http://dbkwik.webdatacommons.org/resource/hP6bMjuZVGoBcWI1PXJnQA==
n414http://dbkwik.webdatacommons.org/resource/vXunskOAO1SwFKOXD2AN7g==
n121http://dbkwik.webdatacommons.org/resource/cGcZeZJW7y_6yGNCXebiUw==
n481http://dbkwik.webdatacommons.org/resource/rtcd5ySkcwMnLm1C9H4lyA==
n185http://dbkwik.webdatacommons.org/resource/u9CoJLveKa3hQjUy9NRJUg==
n457http://dbkwik.webdatacommons.org/resource/RKKUyaMc0HTBM7MUoKgMcw==
n463http://dbkwik.webdatacommons.org/resource/JozHohaWS9ar3gKNQ1ez-w==
n303http://dbkwik.webdatacommons.org/resource/CNRe-b7h4c6Z9t3IFnTFlw==
n479http://dbkwik.webdatacommons.org/resource/sDT3TQewF-36huC7IWfWgw==
n408http://dbkwik.webdatacommons.org/resource/VVK6fqpIwYLSPqj4ZK5r5w==
n263http://dbkwik.webdatacommons.org/resource/r-t4JvfOschkfmrsX_ZFNA==
n203http://dbkwik.webdatacommons.org/resource/iohzjFesYqSqLPHHSgGlPQ==
n180http://dbkwik.webdatacommons.org/resource/6O7dw_71jVZLSHBvIvpmFA==
n173http://dbkwik.webdatacommons.org/resource/fPjhflR2YHNK-BG-5TKjTA==
n354http://dbkwik.webdatacommons.org/resource/3g9RcESl7IoH0q1dfYSOgg==
n135http://dbkwik.webdatacommons.org/cyberchase/property/
n179http://dbkwik.webdatacommons.org/resource/gvX11sAQYXETo8JYIGyl2Q==
n244http://dbkwik.webdatacommons.org/resource/2LnkxozdYH-PnJ46c_CJAA==
n411http://dbkwik.webdatacommons.org/resource/gmGGu9J3YdePT18MFNKOJQ==
n267http://dbkwik.webdatacommons.org/resource/FnYO3c-0TMZNEorWBvCEIQ==
n77http://dbkwik.webdatacommons.org/resource/Rf-2Hx0dfr-dCuwrU8rNNQ==
n138http://dbkwik.webdatacommons.org/resource/3TdScRCdm6mI9YH82vbS7g==
n430http://dbkwik.webdatacommons.org/resource/-k2WAaFefRmoZuxnTohizg==
n246http://dbkwik.webdatacommons.org/fr.illogicopedia/property/
n115http://dbkwik.webdatacommons.org/resource/m4-fw5JT5EZQDKJRKumQ4Q==
n295http://dbkwik.webdatacommons.org/resource/MD50oerdweTeOaOr19FIJQ==
n145http://dbkwik.webdatacommons.org/resource/yaZF6Rz0mofWx9Df2txdiA==
n365http://dbkwik.webdatacommons.org/resource/147j7bOJp4FvpvnUP-WnQA==
n514http://dbkwik.webdatacommons.org/resource/QAk6AYC137yFW7JMo_1goQ==
n76http://dbkwik.webdatacommons.org/resource/BVm3cYnqSNZW6NrLEN3FZg==
n384http://dbkwik.webdatacommons.org/resource/yqAIy1ey8A0bi07SnOxf7g==
n286http://dbkwik.webdatacommons.org/resource/UULbLhJlEX4BtEDhx_zvmA==
n128http://dbkwik.webdatacommons.org/resource/MadpNSyKKWFrtroO-zzyqA==
n2http://dbkwik.webdatacommons.org/resource/Ed_M75oa4hksGatTGdocGg==
n124http://dbkwik.webdatacommons.org/nonsensopedia/property/
n111http://dbkwik.webdatacommons.org/resource/wiALoOJuN6u2I2_kxU8Zdw==
n10http://dbkwik.webdatacommons.org/fi.ratchet/property/
n412http://dbkwik.webdatacommons.org/resource/yWDuitxilru5NQ5ujmqS3A==
n93http://dbkwik.webdatacommons.org/resource/WFwwBziUtdFgNvIkDLYkWQ==
n396http://dbkwik.webdatacommons.org/resource/COJUcWKhbOjbZtAPu0HmjQ==
n67http://dbkwik.webdatacommons.org/resource/5LlVe-yLzin3HIn7AH3-Bg==
n429http://dbkwik.webdatacommons.org/mafiawars/property/
n318http://dbkwik.webdatacommons.org/resource/MX2BIg8wwUJ5ez_LYcB8Nw==
n4http://dbkwik.webdatacommons.org/lego-games/property/
n22http://dbkwik.webdatacommons.org/resource/gKzqE02nM2IyoQ6Vrn-3pQ==
n308http://dbkwik.webdatacommons.org/resource/UpM5bpjkC8aso0i2lASsDw==
n332http://dbkwik.webdatacommons.org/resource/NGTaZKFUh8n5nBP-VVreBA==
n167http://dbkwik.webdatacommons.org/resource/WPV-R3s2AEIikqYDGiWkdA==
n219http://dbkwik.webdatacommons.org/resource/qxKU_i69iTLTgRQx8CspXg==
dbrhttp://dbpedia.org/resource/
n519http://dbkwik.webdatacommons.org/resource/RBY33obbZM_VdFiTE5LEzw==
n393http://dbkwik.webdatacommons.org/resource/kB6sDaJpKkP7ooVoYVQg7g==
n24http://dbkwik.webdatacommons.org/resource/QdkTFdHnpz8v79o2EmBeAw==
n59http://dbkwik.webdatacommons.org/resource/Xg6JKT5cVleKibRHrabUng==
n425http://dbkwik.webdatacommons.org/resource/8EmAKBF2IJJIaWREkjhLyQ==
n98http://dbkwik.webdatacommons.org/resource/4_tf5USebLQc3O9P5r0i3Q==
n120http://dbkwik.webdatacommons.org/resource/oTTGn_metqUSzhaxKbGxYQ==
n507http://dbkwik.webdatacommons.org/resource/fH1k7ph4ATcZMU0S2B2VdA==
n392http://dbkwik.webdatacommons.org/resource/b6ZmrXVmSoGnL6krRG7gog==
n235http://dbkwik.webdatacommons.org/resource/RYZ75upjazVORu8g4xrAWQ==
n118http://dbkwik.webdatacommons.org/resource/S_CZ5zSMhRJ7cU2NiSiXUg==
n250http://dbkwik.webdatacommons.org/resource/JY7iTPzCdnzJziCViivXng==
n253http://dbkwik.webdatacommons.org/resource/xJg5Ueqk0gOmDPXt0DeVCw==
n94http://dbkwik.webdatacommons.org/interlingua/property/
n12http://dbkwik.webdatacommons.org/planetside/property/
n401http://dbkwik.webdatacommons.org/resource/_8v2enXbUGZxU-x3Pnc_5Q==
n532http://dbkwik.webdatacommons.org/resource/PGy4MY5N5lA3FgsIlT0-VQ==
n322http://dbkwik.webdatacommons.org/resource/w8a7ws-JfjHnXaeDrFnjEA==
n330http://dbkwik.webdatacommons.org/resource/diz9vkd8aGEtvJAPSHdnGA==
n248http://dbkwik.webdatacommons.org/resource/hY5Wc5VHNBAYQxOzITmFNQ==
n252http://dbkwik.webdatacommons.org/resource/sI1L19I9FZu2t1-2LRpumQ==
n184http://dbkwik.webdatacommons.org/resource/1sN1GpqYACvUmuD9eWfIPA==
n494http://dbkwik.webdatacommons.org/resource/jEWMyciF0gj7JmQfSPyckQ==
n104http://dbkwik.webdatacommons.org/resource/dolq4PkqtQYZkaZ65Q9Lrg==
n423http://dbkwik.webdatacommons.org/resource/bQx4yvM0jfw4bs4z7AFZKQ==
n159http://dbkwik.webdatacommons.org/resource/rL32v4yrJiMqXXba8qqoPw==
n470http://dbkwik.webdatacommons.org/resource/zZ_M_FFxsuyfmuIdPPXiIw==
n148http://dbkwik.webdatacommons.org/resource/gyYJh9pYHUzmjBfPVBYDuQ==
n123http://dbkwik.webdatacommons.org/resource/89FEgk4kyuOowJxq8KleKQ==
n158http://dbkwik.webdatacommons.org/resource/v2lPIA4xzN83TajkFa9rxQ==
n498http://dbkwik.webdatacommons.org/resource/qIpLhiJh7e1kFtGxHnfSUA==
n109http://dbkwik.webdatacommons.org/resource/ev0lGcEC7_ksxuy5FXswSw==
n103http://dbkwik.webdatacommons.org/resource/h2WHU_GKxDOBgpoAPKHmZQ==
n424http://dbkwik.webdatacommons.org/resource/pxvfK2bbZKkm69Lb6CWpLQ==
n82http://dbkwik.webdatacommons.org/resource/JkwpzT9xuqphTOKCsZWMPg==
n381http://dbkwik.webdatacommons.org/resource/Z9G6v3Pnvaaeute0Alq-AA==
n317http://dbkwik.webdatacommons.org/resource/g8eUhMW6PIR_Ai7Ji7eoQw==
n66http://dbkwik.webdatacommons.org/resource/Cykkt0udE443H2kFV5hy8w==
n268http://dbkwik.webdatacommons.org/resource/G6rt_8j17rl44araXFca8g==
n402http://dbkwik.webdatacommons.org/resource/-9HdxWYrYLvyy5uzyaCTeg==
n200http://dbkwik.webdatacommons.org/resource/C73oVEYzJgADV11W0Q0FOw==
n343http://dbkwik.webdatacommons.org/resource/3HHapF1jb0CPNbhWQp7QCQ==
n108http://dbkwik.webdatacommons.org/gijoe/property/
n376http://dbkwik.webdatacommons.org/resource/_V20sy86s8qHh6VGlBOzcg==
n134http://dbkwik.webdatacommons.org/resource/OvkqUlbLpcppMoUjluJ_EQ==
n331http://dbkwik.webdatacommons.org/resource/MdEyv8QMOAlnBdF8VOze8g==
n217http://dbkwik.webdatacommons.org/resource/gmj4m7YssOchO_8EdXLWiA==
n29http://dbkwik.webdatacommons.org/resource/7lydXaUR6RhPzwzX8JmDAw==
n328http://dbkwik.webdatacommons.org/resource/YfWq7RwRhf7uxKSRE4VeJw==
n386http://dbkwik.webdatacommons.org/resource/Ve0-ly6QCWRLoOylGqfEbQ==
n493http://dbkwik.webdatacommons.org/resource/Zvlj_l3HDt01_oYmF_JM-g==
n280http://dbkwik.webdatacommons.org/resource/YsOtkGdP4_PY0FagTujeVA==
n302http://dbkwik.webdatacommons.org/resource/GKce83xLbtLD9mwgRtnQIw==
n462http://dbkwik.webdatacommons.org/resource/YaiKYI3zY78PgDBgR4i4Qw==
n410http://dbkwik.webdatacommons.org/resource/zJQanahaOCNOVHE5v4K6iQ==
n175http://dbkwik.webdatacommons.org/resource/keaszW5_wtz5HLkfOwq90g==
n64http://dbkwik.webdatacommons.org/resource/TiQioEO66zbsd5ClCNHnyA==
n225http://dbkwik.webdatacommons.org/resource/nR9iQW2f8Bv_nO9NTXww_w==
n197http://dbkwik.webdatacommons.org/resource/h_FljxpWDAl0VaM85-6mOA==
n99http://dbkwik.webdatacommons.org/itlaw/property/
n349http://dbkwik.webdatacommons.org/resource/P76XUTYxSMqaqTReZB_bKA==
n497http://dbkwik.webdatacommons.org/resource/ta69HFEzVf-tLBldbd3yOQ==
n459http://dbkwik.webdatacommons.org/resource/8Y7A9TDsWXw5AKU27_mJEQ==
n242http://dbkwik.webdatacommons.org/resource/eulfbN1WOky6Jw1j1mF9tQ==
n526http://dbkwik.webdatacommons.org/resource/n0vUqm5FuJgydwlq2IRb4A==
n127http://dbkwik.webdatacommons.org/resource/wNXgRIHbKYXtu9xxlFyKfw==
n168http://dbkwik.webdatacommons.org/resource/C8izKoP-oF0ErXMtgNeESg==
n206http://dbkwik.webdatacommons.org/resource/HLL4tQzkLc6GzFtI0Coz_g==
n155http://dbkwik.webdatacommons.org/resource/xZx4Ol3jz4L3zYtTTqc9yg==
n435http://dbkwik.webdatacommons.org/resource/r_WtJ7bTcIHvnQVZrU6sPA==
n505http://dbkwik.webdatacommons.org/resource/GlJ4aiammsAWI6dYJiAp6A==
n529http://dbkwik.webdatacommons.org/resource/8KMRobLaIvkLr32_99FMSQ==
n63http://dbkwik.webdatacommons.org/resource/D33kE5_XtJngdF7qmJrjug==
n169http://dbkwik.webdatacommons.org/cnc/property/
n388http://dbkwik.webdatacommons.org/resource/b_A2GqHY-0aA7-lNKolqPA==
n291http://dbkwik.webdatacommons.org/resource/sgJ-Ir4NW3NRGOFZb8bQXQ==
n28http://dbkwik.webdatacommons.org/computersecurity/property/
n13http://dbkwik.webdatacommons.org/resource/kEIPalCmuhHkjqOBHxzxhA==
n351http://dbkwik.webdatacommons.org/resource/zq8rUHHMv0Imt1MmQqSWYA==
n309http://dbkwik.webdatacommons.org/resource/gaJKcrEV9k5ZimODEs7lSg==
n436http://dbkwik.webdatacommons.org/resource/PNQPcFfqPDji1Gkr3WRN1Q==
n314http://dbkwik.webdatacommons.org/resource/p4_iufP61NhJm2VIPlSU9g==
n293http://dbkwik.webdatacommons.org/resource/26-2CMDDbet6slGuzG3dCA==
n477http://dbkwik.webdatacommons.org/resource/BHhw-q9X1tQpIzdGwf9bdQ==
n84http://dbkwik.webdatacommons.org/resource/RMKnyjCNFBhcPXR3UyTnsg==
n482http://dbkwik.webdatacommons.org/resource/ePzHdEbOZ6pnSyGNrC4hWw==
n406http://dbkwik.webdatacommons.org/resource/zSvID_Uy3di99yZ5iuzcHA==
n345http://dbkwik.webdatacommons.org/resource/GTPvpnr2BksIsa7PRs1qHg==
n439http://dbkwik.webdatacommons.org/resource/2AW4O3ovyiSoNCd6r0qbsw==
n512http://dbkwik.webdatacommons.org/resource/qHUYbg683VVB31avkODwAg==
n282http://dbkwik.webdatacommons.org/necyklopedia/property/
n72http://dbkwik.webdatacommons.org/resource/GA5uplFdyTVzXD5zTJ1Dtg==
n23http://dbkwik.webdatacommons.org/valkyriecrusade/property/
n326http://dbkwik.webdatacommons.org/resource/Txqorp9-JfQlNkv0OZ280g==
n337http://dbkwik.webdatacommons.org/resource/oLyXiXwztcMb3klOiMkHBA==
n281http://dbkwik.webdatacommons.org/resource/kmJgi1lL7juHjo9Xxoq_Ew==
n100http://dbkwik.webdatacommons.org/resource/sd4ZFBDfe7G0KB-Lux1GYA==
n130http://dbkwik.webdatacommons.org/de.fallout/property/
n327http://dbkwik.webdatacommons.org/resource/foluubnNuxK5hkZ1gBmOIw==
n451http://dbkwik.webdatacommons.org/resource/3agOlpTLkiralPmFn3jOCQ==
Subject Item
n61:
n62:
n2:
Subject Item
n241:
n62:
n2:
Subject Item
n2:
rdf:type
n113: n121: n216: n318: n331: n424: n457: n511: n516: n527:
rdfs:label
HACKER Hacker Hacker Hacker Hacker Hacker Hacker Hacker Hacker Hacker Hacker Hacker Hacker Hacker
rdfs:comment
Hackerzy potrafią posługiwać się wymyślonym przez nich i rozumianym tylko przez koty językiem. Przypadkowo zapytany na ulicy Hacker o sytuację polityczną w Polsce mówi: J4k poD@ją M3D14, CZYl1 gu9l3 sytU4cj4 je$t R4CZEJ Zł4 jAK Ms w1NDow5, wIęC J@K Wi@Dom0 LEp13J jE5T uŻYW4ć lINUx4! A Hacker (ハッカー Hakkā?) is someone with the ability to force an item, program, or system to deviate from its intended functions for the hacker's own ends. In the context of the Digimon franchise, where Digimon inhabit a world birthed from electronic systems, hackers can have significant power to influence the Digital World, from uninvited access to actual, reality-warping effects. A malicious hacker once managed to disrupt the Computer Network, and it was still being repaired when Coelamon was discovered, while the evil feelings of hackers who abuse the Network produced Devidramon. Object: Hacker Howtos: * Howto become a hacker Related objects: * Hack Hacker Mode is a feature of Battlefield Hardline. Similar to Commander mode, it allows players to support their teams through a variety of actions. Each team's hacker works to gain control over objects in the field, hinder the enemy hacker's efforts, and provide their team with temporary upgrades. Like the commander in Battlefield 4, hackers can earn awards and cash towards progression for their performance. A player already present in a server as a field agent may assume the hacker position, and an active hacker can leave the position and become a field agent, as could be done in Battlefield 2/2142. Hacker is a doctor at Stockton State Prison. Hacker (no real name known) is a member of the Felonious Four. He's a baseline who's good with computers and who also does martial arts and swords. He takes the emeralds in the hostage crisis part of the Birthday Brawl. Un Hacker (ハッカー Hakkā) es un individuo que se dedica a programar de forma entusiasta, y que tiene la capacidad de forzar un sistema o un programa para que se desvíe de sus funciones programadas y sirva a sus propios fines. En el ámbito de la franquicia Digimon, donde el Mundo Digital es un mundo que fue creado a partir de la Red de Computadoras, los hackers pueden llegar a tener gran influencia en este, desde simple acceso no autorizado a la Red hasta causar efectos que pueden alterar la tela misma de la realidad. Hacker ist ein Extra in Fallout 4. Hacker var en innretning som gjorde det mulig å hacke seg inn i sikkerhetssystemer og åpne dører. Hacking, while officially considered a criminal act in most cases (social terrorism), is not always malicious or harmful. Government agencies and large corporations may hire former hackers to help them protect their networks, intranets, and security systems. Inversely, these same organizations may employ them to hack into these areas of other organizations (corporate espionage). The government agencies who hire former hackers usually do so in return for the exoneration of the hackers' past crimes. Hacker ist ein Extra 3 aus Call of Duty: Black Ops.thumb Hacker is a term from old Internet (pre-Crash of 2029) for a Person, that uses computers and networks in an illicit way. In the era of wired Matrix the term "Hacker" was replaced by the term "Decker" - a word, created by combining "Hacker" and "Cyberdeck". After the second Crash (the Crash of 2064) and the Wireless Matrix Initiative the term "Decker" was replaced again by the older term "Hacker" because he doesn't need a cyberdeck anymore to manipulate the new, wireless matrix, because he can do it just with a commlink. And to confuse matters more, in 2075 GOD rolled out a new wireless protocol for the Matrix. To bypass the new protocols you now need a device called a "Cyberdeck". Which has brought back the term "Decker" and the term "Hacker" has become a generic term to describe anyone th Un hacker (termine difficile da tradurre nella lingua italiana) è una persona che si impegna a superare, grazie al suo studio e la sua intelligenza nell' ambito informatico, diversi blocchi: come sistemi operativi, etc. Spesso il termine "hacker" viene associato come "criminale informatico" la quale la definizione corretta sarebbe: "cracker". A hacker is The term hacker encompasses Real Name: Unknown Age: 29 Nickname: Hacker Birth Date: Unknown Birth Place: Japan Mission: Clean sectors from Aliens. In order to hack through doors, Ratchet had to collect green code snippets using the tractor beam which traveled down wires to the core. He also had to destroy the red defense programs using the cannon, otherwise the section would reset. Indestructible blue defenses protected the objects for a set period of time. __NOEDITSECTION__ In common usage, a hacker is a person who breaks into computers. The subculture that has evolved around hackers is often referred to as the computer underground. Proponents claim to be motivated by artistic and political ends, but are often unconcerned about the use of criminal means to achieve them. While other uses of the word hacker exist that are not related to computer security (computer programmer and home computer hobbyists), they are rarely used in mainstream context. Hacker ist eine Mission aus Grand Theft Auto Online von Lester Crest. Sie wird auf Rang 60 freigeschaltet und kann von 1 bis 4 Spielern absolviert werden. HACKER is the code name used by Sergeant Jesse E. Jordan from Emmetsburg, Iowa. Hacker was a computer specialist at Fort Leonard Wood repairing the mainframe that handles personnel records when he heard the G.I. Joe team was looking for new members. He hacked into the Pentagon's computers and put his name at the top of the candidate list. General Hawk thought he was being sloppy, but Hacker was just trying to get Hawk's attention, and gave him a disk containing the general's high school records including copies of detention slips. After spending some time as one of the Joes' "" recruits, Hacker graduated to full member status as the Joes' information retrieval specialist. Hacker, (also known as "The Hacker"), is the main villain in Cyberchase. He is the Cybersquad's arch-nemesis. He plans to take over all of cyberspace. He is supported by Buzz, Delete, and on occasion, Wicked. Hacker is known for his hair supported by wig gel, a pointy chin, and a very conceited and disrespectful personality. He is voiced by Christopher Lloyd. His favorite color is puce. thumb Hacker, término dado a las personas que pertenecen a una comunidad en especial y que les encanta la informática la computación y todo lo relacionado con sistemas informáticos. While other uses of the word hacker exist that are not related to computer security (computer programmer and home computer hobbyists), they are rarely used in mainstream context. Hackers can also put malware on your computer, find deadly exploits in your operating system and programs, or ddos you. Hacker is a friend of Sonic's who hacked into Robotnik's computer and stole his 'Genius' Chip Program. Un hacker este un expert în informatică, care se ocupă cu studiul în profunzime al programelor informatice (sisteme de operare, aplicații), adesea folosind tehnici de inginerie inversă (demontare), cu scopul de a obține cunoștințe care nu sunt accesibile publicului larg. Cei ce folosesc aceste cunoștințe în scopuri ilegale, pentru a compromite securitatea sistemelor informatice sau a aplicațiilor, sunt de fapt crackeri (spărgători), însă în percepția publicului (formată de obicei de mass-media) noțiunile de hacker și cracker adesea se confundă. The Hacker discipline is one of the disciplines that can be chosen after going through the Awakened discipline. Programs are a big part of the hacker ability: such as harmful programs (viruses) and helpful programs (Upgrades). This could be considered a class similar to that of the Mage/Wizard/Lore Master. "Hacker" is a 1997 horror film produced by Sunrise Studios. It was mentioned in Scream 3. Hacker is an ability. Hacker são pessoas que utilizao programas ou sites falsos para tentar lhe hackear. há varios modos de se proteger de um hacker, estes são: Programas Não Oficiais da Cipsoft Nunca baixe programas que lhe dão privilégios no jogo, como bots, mc (multi-client) aquele um que deixa você logar em 2 chars ao mesmo tempo, sua senha do Tibia fica alocada na memória do jogo, e tais programas dão tais previlégios somente porque mudam os dados da memória. Article removed. The word "hacker" was originally defined as a person who tries to find clever uses or explore the full possibilities of the subject; one who "loves to program; enjoys playful cleverness, or a combination of two.". While hacking sometimes implied breaking security or violating the law, this was rarely the case. The mainstream media, on the other hand, uses the word "hacker" specifically to mean those breaking into computer systems or Internet servers (which the original hackers tend to call "crackers" instead). A hacker is a person who is unauthorized to enter your account, but does so anyway usually to harm it by stealing your items, suiciding your character, or even changing the sex of your character. It is illegal to hack in Tibia. Ein Hacker [sprich Hecker, auch Haxor] ist ein Mensch, der überdurchschnittlich viel Ahnung von Computern und deren Innereien hat. Wenn sie nicht gerade die Welt vor Cyber-Terroristen retten, verbringen sie ihre Zeit damit, mit einer Axt auf ihre Rechner einzuprügeln. Bevor es Computer gab, waren Hacker hauptsächlich in Wäldern anzutreffen. Durch das zunehmende Waldsterben wurden sie allerdings an Schreibtische umgesiedelt. Haku Keiichi (波玖(はく) 佳一(けいいち)), also known as Hacker (ハッカー), is a scout character in Inazuma Eleven GO. The Hackerin avulla voi avata ovia. Pelissä täytyy kerätä vihreitä koodikipinöitä ja tuhota punaiset palomuurikipinät. Sinisiä kilpiä ei voi tuhota. [Source] RC-1140 (surnommé Hacker) est un commando clone de la Grande Armée de la République. Il fait parti de l'escouade Delta en tant qu'expert en technologie. Il apparaît dans le jeux vidéo Star Wars : Republic Commando et dans les livres de la série Republic Commando. Il est facilement reconnaissable avec son armure peint en vert. The Hacker is an exclusive, "very cool" special agent. It has a computer and keeps typing, no seriously. Nothing to do here! It costs 120 MM. Just kidding. Anyway, it has a range of 196px and when a machine bloon/blimp comes into its range, a green bar will appear in the left side of that bloon, when that bar fills up (the objective is the total RBE of the targeted bloon and the Hacker "hacks" by 30 RBE/sec), that bloon is stunned, and the player can click it. The game is paused and a list of its abilities (if it has any) and a button to make it walk 1 second backwards appears (note that abilities that have X% chance of occuring have X% chance of being successful instead). Note that abilities that are used on bloons are still used on bloons (and attacks that damage towers damage bloons ins Hacker is a new piece of equipment in the new Zombie map Moon. It takes up the equipment slot so players can't have this and the P.E.S. at the same time. The equipment is needed for five of the new achievements/trophies: "One Small Hack for Man", "One Giant Leap", "Cryogenic Slumber Party", "Big Bang Theory", and "Ground Control." The Hacker can be found in any of the three laboratory floors, on any desks near the sides of the room. If a player obtains another P.E.S, it will move to another random desk. The Hacker may be used on various areas around the map with different outcomes. Hacker is a perk in Fallout 4. The Hacker is a support unit for Novus. It is insignificant, meaning enemy units and turrets will not attack it autonomously. It cannot attack. Instead, it can lockdown an enemy unit to prevent it from moving or take control of an enemy turret (range 0-175). It is immune to mind control and Amplifier ability lockdown. The Hacker Career Track comes with The Sims: Livin' Large. While it requires a lot of skills, few friends are needed, and at the top levels it is the highest paying career in the game. The Information Overlord will eventually change careers and become a Newspaper Reporter in the Journalism career track. A Hacker in Toontown Online is a toon player who uses programs to gain an unfair advantage over others, or to harass other players. This is against the the game's terms of use and can easily get one banned. Toontown has repeatedly spoken out against using third-party programs and cheating. Also, there have been a higher number of downtime periods for the game due to constant abuse of the sytem. Hackers mostly look for attention, so ignoring them and going to another district is the best defence. A Hacker is a program designed to infiltrate a system. They are designed to easily get past security systems and create elaborate codes to secure things they wish to keep safe. Most other programs have a very poor opinion of hackers. Hackers do not naturally belong to any one system and as a result their icons are not formatted to reboot in a Game Cube. If they ever wind up inside a Game they will be trapped. The only Hacker encountered by the citizens of Mainframe is Mouse. [[Archivo:Slicer TofG.jpg|thumb|right|250px|Un hacker trabajando con un datapad]] El término "cortador", "cortacódigos" o "hacker" fue usado para describir a expertos en computadoras, a menudo autodidactas, que destacaban en trabajos dentro de una red informática compleja, y fueron capaces de extraer información de esta red con gran habilidad. A menudo, esta información se obtenía por cualquier número y la forma de encriptación y sistemas de bloqueo, y un hacker experto fue capaz de eludir estos sistemas, sin provocar alarmas. The elite guards to The Master L'hacker è colui che in questo preciso istante sta entrando nel tuo computer, ma tu non lo sai. Tranquillo, ha un'etica da rispettare, quindi se ne andrà in un istante senza fare danni! Io mi preoccuperei piuttosto di quel cracker che ti ha rubato il pin della carta di credito l'altro giorno... Hacker (angl. aj H4CK3R, množné číslo H4CK3R5) je druh moderného padúcha, ktorý, napriek tomu že by to malo byť na zamyslenie, je nejakým záporným „ja“ Chucka Norrisa. Hacker je teda vlastne zlým modelom nadľuda. Hacker je modifikovaný neobmedzenec, ktorý dokáže jediným klikom myši spôsobiť taký hrozný zločin, že je až moderný... ten zločin. Z tepla svojej miestnosti popri pozeraní porna sa tým klikom myši nabúra do databáz, účtov, a bankových kônt na celom svete a aj práve vám, ktorí teraz čítate tieto riadky pozerá vaše fotky na disku a počúva vaše posťahované empétrojky. Since they are not intended to be front-line fighters to be thrown straight into harm's way, they receive no weapons training or body armor. However, their skills in computers can give the Chinese a boost in their war resources or even wreak havoc on the enemy's base if they managed to infiltrate behind enemy lines. Hackers could remotely disable enemy structures using sophisticated computer programs. More often, however, they were employed in hacking insecure bank accounts of unsuspecting Internet users, covertly diverting money into China's military coffers. First the general gets 5 cash every few seconds with them; after generating $500, the hacker gets promoted, generating $6 at a slightly faster rate, then $8 at an even faster rate after generating an additional $1200, reaching full r
owl:sameAs
dbr:Hacker
n336:
n337:
n410:
Great
n406:
Good
n85:
112.0
n351:
85
dcterms:subject
n9: n19: n27: n38: n48: n55: n58: n59: n65: n69: n70: n71: n78: n97: n107: n112: n120: n133: n134: n137: n139: n150: n154: n155: n163: n171: n172: n178: n179: n183: n186: n188: n190: n198: n201: n206: n207: n215: n220: n221: n223: n224: n226: n227: n229: n231: n233: n237: n238: n244: n248: n250: n253: n255: n259: n270: n271: n272: n273: n274: n275: n286: n287: n288: n296: n297: n298: n302: n310: n319: n323: n330: n343: n344: n346: n347: n348: n353: n203: n360: n362: n369: n371: n374: n383: n384: n322: n392: n394: n395: n397: n399: n401: n403: n407: n408: n417: n418: n425: n433: n436: n437: n441: n442: n451: n452: n460: n464: n470: n472: n475: n477: n480: n487: n488: n490: n499: n507: n510: n512: n514: n519: n521: n522: n526: n528: n529:
n68:
Masculin
n434:
n435:
n293:
20
n389:
es.hacker
n138:
4
n257:
*G.I. Joe Team
n473:
Time for some hacking!
n340:
143.0
n76:
2400 2640
n396:
Human Armor
n358:
erlaubt das Hacken hochstufiger Terminals
n66:
n67:
n166:
All allies' DEF 50% up / 20% chance All allies' DEF 50% up / 15% chance
n276:
Trajan Leet
n509:
Intelligenz 4 Level 1/9/21/33
n92:
n93:
n404:
2700
n301:
see table [[#Effekte
n160:
"Hacker"
n86:
n87:
n258:
21600
n484:
Computer laptop
n493:
32
n292:
Jul.5.2010
n57:
Non-Giftable
n79:
3
n518:
a
n14:
n15: n60:
n173:
Game Update Number 9
n458:
Body Armour
n103:
Mobiltelefon oder Pausemenü
n101:
3050 3355
n194:
You plan on intruding? Go ahead and try it.
n450:
ハッカー
n291:
Intelligence 4 Level 1/9/21/33
n315:
Since you've exposed me so, I have no choice but to listen to you master! You're the first one to break through all my security.
n385:
I was hacked...
n443:
R
n524:
n525:
n211:
Welcome. The backdoor I programmed is always open.
n387:wikiPageUsesTemplate
n388: n411: n456:
n169:wikiPageUsesTemplate
n170: n309: n449: n523:
n21:wikiPageUsesTemplate
n22: n189:
n130:wikiPageUsesTemplate
n131: n306: n373: n409: n481:
n212:wikiPageUsesTemplate
n213: n508:
n141:wikiPageUsesTemplate
n142: n157: n181: n232:
n234:wikiPageUsesTemplate
n235:
n122:wikiPageUsesTemplate
n123: n127: n228: n242: n320: n349: n515:
n208:wikiPageUsesTemplate
n209: n245: n303: n307: n313: n386: n520:
n30:wikiPageUsesTemplate
n31: n104: n222: n252: n295: n391: n448:
n176:wikiPageUsesTemplate
n177:
n53:wikiPageUsesTemplate
n54: n72: n316: n359: n368: n412: n432: n438: n497:
n34:wikiPageUsesTemplate
n35: n46: n77: n143: n193: n214: n370: n390: n421:
n110:wikiPageUsesTemplate
n111: n167: n413: n455: n501: n530:
n17:wikiPageUsesTemplate
n18: n332:
n108:wikiPageUsesTemplate
n109: n254: n405:
n289:wikiPageUsesTemplate
n290: n299: n365:
n94:wikiPageUsesTemplate
n95: n102: n217: n218: n225: n328: n338: n445: n463: n469: n479: n500:
n4:wikiPageUsesTemplate
n5: n140: n159:
n239:wikiPageUsesTemplate
n240: n251: n498:
n429:wikiPageUsesTemplate
n430:
n32:wikiPageUsesTemplate
n33: n300: n308: n462:
n262:wikiPageUsesTemplate
n263:
n282:wikiPageUsesTemplate
n283: n339:
n152:wikiPageUsesTemplate
n153: n174: n342: n402: n502: n517:
n124:wikiPageUsesTemplate
n125: n431: n474: n478: n531:
n25:wikiPageUsesTemplate
n26: n416:
n485:wikiPageUsesTemplate
n486:
n325:wikiPageUsesTemplate
n326: n361: n494:
n377:wikiPageUsesTemplate
n378: n453: n465: n466:
n161:wikiPageUsesTemplate
n162: n355: n506:
n191:wikiPageUsesTemplate
n192: n505:
n146:wikiPageUsesTemplate
n147:
n23:wikiPageUsesTemplate
n24: n196: n461: n503:
n80:wikiPageUsesTemplate
n81:
n28:wikiPageUsesTemplate
n29: n363: n415:
n105:wikiPageUsesTemplate
n106: n264:
n135:wikiPageUsesTemplate
n136: n267:
n284:
n285:
n367:
Emmetsburg, Iowa
n184:
150
n439:
145
n379:
100
n47:
Northern Frontier
n40:
n41:
n354:
8 2 1
n3:
Hack and Dash
n98:
Wind Cool
n56:
Frigate
n471:
FO4
n63:
Stockton State Prison n382: n510:
n42:
2011-12-19
n305:
US Army
n482:
Fast
n427:
Jennot Marieaux
n204:
n205: China Barracks n329: Victor Raven
n202:
n203:
n265:
n266:
n119:
*République Galactique **Grande Armée de la République ***Escouade Delta
n249:
n206:
n128:
n129:
n393:
Covert ops infantry
n96:
Male
n175:
FO4
n187:
Computer Nerd
n281:
Hacker
n151:
Slicer
n43:
Hacker Hacker Hacker frigate
n117:
n118: MF n259: Henchmen
n64:
"Grounder the Genius"
n372:
Christopher Lloyd
n39:
Information Retrieval
n341:
Computer hacking
n12:wikiPageUsesTemplate
n13: n532:
n356:
n357:
n440:
1
n366:
Cha, cha, chá!!!
n414:
Dpadua pirata.jpg
n420:
220
n350:
60
n10:wikiPageUsesTemplate
n11:
n99:wikiPageUsesTemplate
n100: n335:
n88:wikiPageUsesTemplate
n89:
n74:wikiPageUsesTemplate
n75:
n246:wikiPageUsesTemplate
n247:
n311:wikiPageUsesTemplate
n312: n423:
n277:wikiPageUsesTemplate
n278:
n467:wikiPageUsesTemplate
n468:
n180:
100.0
n156:
left|25px Disable structures left|25px Hack for cash
n459:
I was born a bit. I was raised on the net. I am a digital prodigy. 生まれはビット、故郷はネット 私はデジタルの申し子よ
n426:
Niconico Broadcast / YouTube Broadcast( )
n230:
Yes
n345:
Sgt. Hacker
n144:
Wiki Hacker es un proyecto de Fandom con el objetivo de reunir información de la comunidad hacker, crear artículos informativos y además ayudar a personas que quieran serlo. Nota: 'Ser [[w:c:es.hacker:Definición:Hacker
n444:
22
n148:
Borg Mole n322:
n197:
Hacker
n428:
Adult
n210:
3355 3050
n513:
Puce
n256:
Firewall
n400:
Ледоруб
n149:
4
n20:
A master of combat in the digital realm. She reads programs as if they were her native tongue.
n483:
Information retrieval; Computer technology; Telecommunications
n236:
white; color: #001E24 9
n185:
*$625 *$780 34 28
n44:
n45: n447:
n158:
Ralampag00
n16:
Commandeering
n398:
Developing multiple firewalls... Stay back.
n195:
Hacker
n73:
HP: 50,000
n168:
150
n476:
Superior
n165:
Abandonada
n82:
100
n243:
#F3B567
n489:
GU09
n321:
1997
n492:
20.0
n182:
Male M
n260:
n261:
n314:
Jesse E. Jordan
n446:
Allows the hacking of more difficult terminals
n199:
n200:
n164:
Wiki Hacker
n280:
1
n51:
n52:
n83:
Fo4 Hacker.png 250
n91:
120
n145:
Hacker
n219:
Sergeant
n352:
100
n36:
n37:
n6:abstract
Hacker is a doctor at Stockton State Prison. Un hacker este un expert în informatică, care se ocupă cu studiul în profunzime al programelor informatice (sisteme de operare, aplicații), adesea folosind tehnici de inginerie inversă (demontare), cu scopul de a obține cunoștințe care nu sunt accesibile publicului larg. Cei ce folosesc aceste cunoștințe în scopuri ilegale, pentru a compromite securitatea sistemelor informatice sau a aplicațiilor, sunt de fapt crackeri (spărgători), însă în percepția publicului (formată de obicei de mass-media) noțiunile de hacker și cracker adesea se confundă. HACKER is the code name used by Sergeant Jesse E. Jordan from Emmetsburg, Iowa. Hacker was a computer specialist at Fort Leonard Wood repairing the mainframe that handles personnel records when he heard the G.I. Joe team was looking for new members. He hacked into the Pentagon's computers and put his name at the top of the candidate list. General Hawk thought he was being sloppy, but Hacker was just trying to get Hawk's attention, and gave him a disk containing the general's high school records including copies of detention slips. After spending some time as one of the Joes' "" recruits, Hacker graduated to full member status as the Joes' information retrieval specialist. A hacker is a person who is unauthorized to enter your account, but does so anyway usually to harm it by stealing your items, suiciding your character, or even changing the sex of your character. It is illegal to hack in Tibia. Ein Hacker [sprich Hecker, auch Haxor] ist ein Mensch, der überdurchschnittlich viel Ahnung von Computern und deren Innereien hat. Wenn sie nicht gerade die Welt vor Cyber-Terroristen retten, verbringen sie ihre Zeit damit, mit einer Axt auf ihre Rechner einzuprügeln. Bevor es Computer gab, waren Hacker hauptsächlich in Wäldern anzutreffen. Durch das zunehmende Waldsterben wurden sie allerdings an Schreibtische umgesiedelt. Hacker is a friend of Sonic's who hacked into Robotnik's computer and stole his 'Genius' Chip Program. Hacker Mode is a feature of Battlefield Hardline. Similar to Commander mode, it allows players to support their teams through a variety of actions. Each team's hacker works to gain control over objects in the field, hinder the enemy hacker's efforts, and provide their team with temporary upgrades. Like the commander in Battlefield 4, hackers can earn awards and cash towards progression for their performance. A player already present in a server as a field agent may assume the hacker position, and an active hacker can leave the position and become a field agent, as could be done in Battlefield 2/2142. The hacker is provided with a top-down camera view of the battlefield, the team's squad list, and a menu of abilities that can be performed on map objects or players. The Hacker is a support unit for Novus. It is insignificant, meaning enemy units and turrets will not attack it autonomously. It cannot attack. Instead, it can lockdown an enemy unit to prevent it from moving or take control of an enemy turret (range 0-175). It is immune to mind control and Amplifier ability lockdown. Hacker is a term from old Internet (pre-Crash of 2029) for a Person, that uses computers and networks in an illicit way. In the era of wired Matrix the term "Hacker" was replaced by the term "Decker" - a word, created by combining "Hacker" and "Cyberdeck". After the second Crash (the Crash of 2064) and the Wireless Matrix Initiative the term "Decker" was replaced again by the older term "Hacker" because he doesn't need a cyberdeck anymore to manipulate the new, wireless matrix, because he can do it just with a commlink. And to confuse matters more, in 2075 GOD rolled out a new wireless protocol for the Matrix. To bypass the new protocols you now need a device called a "Cyberdeck". Which has brought back the term "Decker" and the term "Hacker" has become a generic term to describe anyone that is capable of subverting Matrix security, which includes Technomancers and Riggers. See also: Decker. Since they are not intended to be front-line fighters to be thrown straight into harm's way, they receive no weapons training or body armor. However, their skills in computers can give the Chinese a boost in their war resources or even wreak havoc on the enemy's base if they managed to infiltrate behind enemy lines. Hackers could remotely disable enemy structures using sophisticated computer programs. More often, however, they were employed in hacking insecure bank accounts of unsuspecting Internet users, covertly diverting money into China's military coffers. First the general gets 5 cash every few seconds with them; after generating $500, the hacker gets promoted, generating $6 at a slightly faster rate, then $8 at an even faster rate after generating an additional $1200, reaching full rank after generating an additional $1600. At full rank hackers give a general 10 cash every second. Later in the conflict, the Internet center was developed to protect and aid Hackers in this task by providing them with improved internet access and a shelter that can withstand a direct hit from a super weapon. While China denied the use of this tactic, GLA attacking forces caught Hackers red-handed on more than one occasion, landing them a propaganda coup. Responding to GLA increased aggression toward Hackers. Chinese troops are given a high priority to protect these men from harm. The Hacker could also disable an enemy building, but needed to stay in contact with the building. General Shin Fai created a core of elite hackers, the Super Hackers that were trained by Black Lotus herself. A Hacker (ハッカー Hakkā?) is someone with the ability to force an item, program, or system to deviate from its intended functions for the hacker's own ends. In the context of the Digimon franchise, where Digimon inhabit a world birthed from electronic systems, hackers can have significant power to influence the Digital World, from uninvited access to actual, reality-warping effects. A malicious hacker once managed to disrupt the Computer Network, and it was still being repaired when Coelamon was discovered, while the evil feelings of hackers who abuse the Network produced Devidramon. A hacker is The term hacker encompasses Un Hacker (ハッカー Hakkā) es un individuo que se dedica a programar de forma entusiasta, y que tiene la capacidad de forzar un sistema o un programa para que se desvíe de sus funciones programadas y sirva a sus propios fines. En el ámbito de la franquicia Digimon, donde el Mundo Digital es un mundo que fue creado a partir de la Red de Computadoras, los hackers pueden llegar a tener gran influencia en este, desde simple acceso no autorizado a la Red hasta causar efectos que pueden alterar la tela misma de la realidad. Hacker (no real name known) is a member of the Felonious Four. He's a baseline who's good with computers and who also does martial arts and swords. He takes the emeralds in the hostage crisis part of the Birthday Brawl. Hacker is a new piece of equipment in the new Zombie map Moon. It takes up the equipment slot so players can't have this and the P.E.S. at the same time. The equipment is needed for five of the new achievements/trophies: "One Small Hack for Man", "One Giant Leap", "Cryogenic Slumber Party", "Big Bang Theory", and "Ground Control." The Hacker can be found in any of the three laboratory floors, on any desks near the sides of the room. If a player obtains another P.E.S, it will move to another random desk. The Hacker may be used on various areas around the map with different outcomes. It appears that after the player has held on to Hacker for several rounds, the player will start to receive 1000 points every time a round starts (this includes teleporting from Area 51 back to Moon). Hacker ist ein Extra in Fallout 4. In order to hack through doors, Ratchet had to collect green code snippets using the tractor beam which traveled down wires to the core. He also had to destroy the red defense programs using the cannon, otherwise the section would reset. Indestructible blue defenses protected the objects for a set period of time. Hacker (angl. aj H4CK3R, množné číslo H4CK3R5) je druh moderného padúcha, ktorý, napriek tomu že by to malo byť na zamyslenie, je nejakým záporným „ja“ Chucka Norrisa. Hacker je teda vlastne zlým modelom nadľuda. Hacker je modifikovaný neobmedzenec, ktorý dokáže jediným klikom myši spôsobiť taký hrozný zločin, že je až moderný... ten zločin. Z tepla svojej miestnosti popri pozeraní porna sa tým klikom myši nabúra do databáz, účtov, a bankových kônt na celom svete a aj práve vám, ktorí teraz čítate tieto riadky pozerá vaše fotky na disku a počúva vaše posťahované empétrojky. The Hacker is an exclusive, "very cool" special agent. It has a computer and keeps typing, no seriously. Nothing to do here! It costs 120 MM. Just kidding. Anyway, it has a range of 196px and when a machine bloon/blimp comes into its range, a green bar will appear in the left side of that bloon, when that bar fills up (the objective is the total RBE of the targeted bloon and the Hacker "hacks" by 30 RBE/sec), that bloon is stunned, and the player can click it. The game is paused and a list of its abilities (if it has any) and a button to make it walk 1 second backwards appears (note that abilities that have X% chance of occuring have X% chance of being successful instead). Note that abilities that are used on bloons are still used on bloons (and attacks that damage towers damage bloons instead). If an attack is in a random place or is to a random target (which is pretty much all the abilties), player can not select the bloon to attack, unless specified. The player can use 3 abilties (including the walk backwards one) or 10 seconds (counts while the ability menu is open) until the bloon regains its control and can't be hacked again (due to an increased protection). The Hacker can also decrypt Encrypted Bloons at a rate of 12 bits each second "Hacker" is a 1997 horror film produced by Sunrise Studios. It was mentioned in Scream 3. Hacker são pessoas que utilizao programas ou sites falsos para tentar lhe hackear. há varios modos de se proteger de um hacker, estes são: Programas Não Oficiais da Cipsoft Nunca baixe programas que lhe dão privilégios no jogo, como bots, mc (multi-client) aquele um que deixa você logar em 2 chars ao mesmo tempo, sua senha do Tibia fica alocada na memória do jogo, e tais programas dão tais previlégios somente porque mudam os dados da memória. Senhas Nunca dêem sua senha, número de conta ou e-mail da conta para ninguêm, vai por mim, se o cara é seu amigo ele nunca vai ti pedir isso, nenhum membro da cipsoft ira pedi-la. Sites Maliciosos Cuidado com sites que tenham pornografia, é lá que estão a maioria dos spywares e virus. Cuidado tambêm com sites que fornecem crackers e keys. Cuidado com links estranhanhos, como os que contenhão ".t5." é trojan com certeza. Não sai por ae fazendo downloads, se fizer passe o anti virus e anti spyware antes de abrir. Firewall, Anti-virus Nunca usem anti virus, anti spyware e firewalls cracked, seria o mesmo que pedir o cachorro do ladrão emprestado para vigiar sua casa. Sempre atualizem seus programas, principalmente anti virus, fire walls, anti spywares e sistema operacional. Use muito bem sua firewall, sempre que um programa pedir para acessar a internet(in connection) ou mandar dados para tal(out conection) verifique o caminho do arquivo em seu hd, se é mesmo de um software que você instalou e só autorize depois de ter certeza. Object: Hacker Howtos: * Howto become a hacker Related objects: * Hack [[Archivo:Slicer TofG.jpg|thumb|right|250px|Un hacker trabajando con un datapad]] El término "cortador", "cortacódigos" o "hacker" fue usado para describir a expertos en computadoras, a menudo autodidactas, que destacaban en trabajos dentro de una red informática compleja, y fueron capaces de extraer información de esta red con gran habilidad. A menudo, esta información se obtenía por cualquier número y la forma de encriptación y sistemas de bloqueo, y un hacker experto fue capaz de eludir estos sistemas, sin provocar alarmas. El Imperio Galáctico, la Alianza para Restaurar la República, la Nueva República y la aplicación de la ley y una variedad de organizaciones criminales , así como varios miembros de la Orden Jedi durante la Antigua República contrataron especialistas en computadoras para escribir el código de división. Si bien la mayoría del código de corte podría ser realizado por droides, el "toque personal" se requería con frecuencia para trabajos especiales In common usage, a hacker is a person who breaks into computers. The subculture that has evolved around hackers is often referred to as the computer underground. Proponents claim to be motivated by artistic and political ends, but are often unconcerned about the use of criminal means to achieve them. While other uses of the word hacker exist that are not related to computer security (computer programmer and home computer hobbyists), they are rarely used in mainstream context. Article removed. Hacker var en innretning som gjorde det mulig å hacke seg inn i sikkerhetssystemer og åpne dører. While other uses of the word hacker exist that are not related to computer security (computer programmer and home computer hobbyists), they are rarely used in mainstream context. Hackers can also put malware on your computer, find deadly exploits in your operating system and programs, or ddos you. The Hacker Career Track comes with The Sims: Livin' Large. While it requires a lot of skills, few friends are needed, and at the top levels it is the highest paying career in the game. The Information Overlord will eventually change careers and become a Newspaper Reporter in the Journalism career track. Hacker is a perk in Fallout 4. L'hacker è colui che in questo preciso istante sta entrando nel tuo computer, ma tu non lo sai. Tranquillo, ha un'etica da rispettare, quindi se ne andrà in un istante senza fare danni! Io mi preoccuperei piuttosto di quel cracker che ti ha rubato il pin della carta di credito l'altro giorno... Haku Keiichi (波玖(はく) 佳一(けいいち)), also known as Hacker (ハッカー), is a scout character in Inazuma Eleven GO. The elite guards to The Master __NOEDITSECTION__ Hacker is an ability. The Hackerin avulla voi avata ovia. Pelissä täytyy kerätä vihreitä koodikipinöitä ja tuhota punaiset palomuurikipinät. Sinisiä kilpiä ei voi tuhota. Hackerzy potrafią posługiwać się wymyślonym przez nich i rozumianym tylko przez koty językiem. Przypadkowo zapytany na ulicy Hacker o sytuację polityczną w Polsce mówi: J4k poD@ją M3D14, CZYl1 gu9l3 sytU4cj4 je$t R4CZEJ Zł4 jAK Ms w1NDow5, wIęC J@K Wi@Dom0 LEp13J jE5T uŻYW4ć lINUx4! A Hacker in Toontown Online is a toon player who uses programs to gain an unfair advantage over others, or to harass other players. This is against the the game's terms of use and can easily get one banned. Toontown has repeatedly spoken out against using third-party programs and cheating. Also, there have been a higher number of downtime periods for the game due to constant abuse of the sytem. Hackers mostly look for attention, so ignoring them and going to another district is the best defence. Real Name: Unknown Age: 29 Nickname: Hacker Birth Date: Unknown Birth Place: Japan Mission: Clean sectors from Aliens. The Hacker discipline is one of the disciplines that can be chosen after going through the Awakened discipline. Programs are a big part of the hacker ability: such as harmful programs (viruses) and helpful programs (Upgrades). This could be considered a class similar to that of the Mage/Wizard/Lore Master. A Hacker is a program designed to infiltrate a system. They are designed to easily get past security systems and create elaborate codes to secure things they wish to keep safe. Most other programs have a very poor opinion of hackers. Hackers operate much like Code Masters. They provide a professional service to anyone for the right cost and have no real preference what the job details, providing you never betray or double-cross one. Unlike many people on the Net, Hackers will actually perform contracted work for viruses, something that gets them into huge trouble with the Guardian Collective. Because of such involvement they are generally treated as criminals. Hackers do not naturally belong to any one system and as a result their icons are not formatted to reboot in a Game Cube. If they ever wind up inside a Game they will be trapped. The only Hacker encountered by the citizens of Mainframe is Mouse. thumb Hacker, término dado a las personas que pertenecen a una comunidad en especial y que les encanta la informática la computación y todo lo relacionado con sistemas informáticos. Hacker ist eine Mission aus Grand Theft Auto Online von Lester Crest. Sie wird auf Rang 60 freigeschaltet und kann von 1 bis 4 Spielern absolviert werden. Hacking, while officially considered a criminal act in most cases (social terrorism), is not always malicious or harmful. Government agencies and large corporations may hire former hackers to help them protect their networks, intranets, and security systems. Inversely, these same organizations may employ them to hack into these areas of other organizations (corporate espionage). The government agencies who hire former hackers usually do so in return for the exoneration of the hackers' past crimes. Hacker ist ein Extra 3 aus Call of Duty: Black Ops.thumb Hacker, (also known as "The Hacker"), is the main villain in Cyberchase. He is the Cybersquad's arch-nemesis. He plans to take over all of cyberspace. He is supported by Buzz, Delete, and on occasion, Wicked. Hacker is known for his hair supported by wig gel, a pointy chin, and a very conceited and disrespectful personality. He is voiced by Christopher Lloyd. His favorite color is puce. Un hacker (termine difficile da tradurre nella lingua italiana) è una persona che si impegna a superare, grazie al suo studio e la sua intelligenza nell' ambito informatico, diversi blocchi: come sistemi operativi, etc. Spesso il termine "hacker" viene associato come "criminale informatico" la quale la definizione corretta sarebbe: "cracker". [Source] RC-1140 (surnommé Hacker) est un commando clone de la Grande Armée de la République. Il fait parti de l'escouade Delta en tant qu'expert en technologie. Il apparaît dans le jeux vidéo Star Wars : Republic Commando et dans les livres de la série Republic Commando. Il est facilement reconnaissable avec son armure peint en vert. The word "hacker" was originally defined as a person who tries to find clever uses or explore the full possibilities of the subject; one who "loves to program; enjoys playful cleverness, or a combination of two.". While hacking sometimes implied breaking security or violating the law, this was rarely the case. The mainstream media, on the other hand, uses the word "hacker" specifically to mean those breaking into computer systems or Internet servers (which the original hackers tend to call "crackers" instead).
Subject Item
n491:
n62:
n2:
Subject Item
n324:
n62:
n2:
Subject Item
n294:
n36:
n2:
Subject Item
n327:
n62:
n2:
Subject Item
n454:
n62:
n2:
Subject Item
n495:
n496:
n2:
Subject Item
n504:
n62:
n2:
Subject Item
n132:
n62:
n2:
Subject Item
n364:
n269:
n2:
Subject Item
n126:
n36:
n2:
Subject Item
n419:
n269:
n2:
Subject Item
n115:
n116:
n2:
Subject Item
n114:
n36:
n2:
Subject Item
n375:
n376:
n2:
Subject Item
n333:
n62:
n2:
Subject Item
n422:
n36:
n2:
Subject Item
n90:
n36:
n2:
Subject Item
n380:
n381:
n2:
Subject Item
n304:
n62:
n2:
Subject Item
n279:
n269:
n2:
Subject Item
n268:
n269:
n2:
Subject Item
n334:
n36:
n2:
Subject Item
n317:
n62:
n2:
Subject Item
n84:
n62:
n2: