...it's like TV Tropes, but LINKED DATA!
Digitized Hacker
- 219 statements
- 41 feature instances
- 33 referencing feature instances
Digitized Hacker | type |
FeatureClass | |
Digitized Hacker | label |
Digitized Hacker | |
Digitized Hacker | page |
DigitizedHacker | |
Digitized Hacker | comment |
The only thing more dangerous than The Cracker or Mad Scientist in general is a Virtual Ghost Cracker. Ask just about anyone what they fear about a future where you can jack into the Internet directly through your brain (and Everything Is Online), and the threat of a Cracker or Playful Hacker will usually be in the top three (along with computer viruses and the potential feedback if the mechanical part of the interlink breaks down). After all, we're all told that the human mind is the most powerful computer on Earth, and if that computer were to interface directly with cyberspace, the potential for disaster is limitless. So you can imagine what kind of havoc a computer-savvy criminal or complete psychopath would cause if they were to be digitized and let loose online. Sometimes, they're not even full-fledged Virtual Ghosts; they may have physical bodies to which they can return. It's just that for them, virtual life and omnipotence is much preferable to the alternative. If they do have a physical body to which he can return, you can bet that, if they wish to have a physical avatar, they'll have multiple backup bodies just in case their original goes kaput. See also Brain Uploading, A.I. Is a Crapshoot, Contagious A.I. and Digital Abomination. This is also not dependent on Body Uploading processes that are called "digitization". |
|
Digitized Hacker | fetched |
2023-11-03T23:30:41Z | |
Digitized Hacker | parsed |
2023-11-03T23:30:41Z | |
Digitized Hacker | processingComment |
Dropped link to EmergencyTransformation: Not an Item - FEATURE | |
Digitized Hacker | processingComment |
Dropped link to InstantAIJustAddWater: Not an Item - FEATURE | |
Digitized Hacker | processingComment |
Dropped link to SubvertedTrope: Not an Item - CAT | |
Digitized Hacker | processingComment |
Dropped link to Technopath: Not an Item - FEATURE | |
Digitized Hacker | processingComment |
Dropped link to TheAlternet: Not an Item - FEATURE | |
Digitized Hacker | processingComment |
Dropped link to VoiceWithAnInternetConnection: Not an Item - FEATURE | |
Digitized Hacker | processingComment |
Dropped link to ZigZaggingTrope: Not an Item - FEATURE | |
Digitized Hacker | isPartOf |
DBTropes | |
Digitized Hacker / int_11859033 | type |
Digitized Hacker | |
Digitized Hacker / int_11859033 | comment |
Narbonic: After Dave goes mad, he uploads his brain into the computers in Madblood's Arctic lair, kicks out the A.I. that was previously running them, and nearly loses himself on the world's electronics before Helen can stop him. A rare case of a protagonist being a Digitized Hacker, but then, all the protagonists in Narbonic are Affably Evil. | |
Digitized Hacker / int_11859033 | featureApplicability |
1.0 | |
Digitized Hacker / int_11859033 | featureConfidence |
1.0 | |
Narbonic (Webcomic) | hasFeature |
Digitized Hacker / int_11859033 | |
Digitized Hacker / int_19ac6443 | type |
Digitized Hacker | |
Digitized Hacker / int_19ac6443 | comment |
Zot! has 9-Jack-9, an 'electronic ghost' who can not only control any electronic machinery but also create an extremely deadly Hard Light projection to kill people directly. | |
Digitized Hacker / int_19ac6443 | featureApplicability |
1.0 | |
Digitized Hacker / int_19ac6443 | featureConfidence |
1.0 | |
Zot! (Comic Book) | hasFeature |
Digitized Hacker / int_19ac6443 | |
Digitized Hacker / int_279cd0b8 | type |
Digitized Hacker | |
Digitized Hacker / int_279cd0b8 | comment |
Jeremiah Surd in Jonny Quest: The Real Adventures did this, once he was hooked up with an access to the virtual-reality Questworld. | |
Digitized Hacker / int_279cd0b8 | featureApplicability |
1.0 | |
Digitized Hacker / int_279cd0b8 | featureConfidence |
1.0 | |
Jonny Quest: The Real Adventures | hasFeature |
Digitized Hacker / int_279cd0b8 | |
Digitized Hacker / int_2cd28570 | type |
Digitized Hacker | |
Digitized Hacker / int_2cd28570 | comment |
'God' from Serial Experiments Lain turns out to be one of these, a rather nutty scientist who worked out how to upload himself onto the web. Lain herself might also count; in fact, it's suggested that this is her true nature, and her body was simply created for convenience. | |
Digitized Hacker / int_2cd28570 | featureApplicability |
1.0 | |
Digitized Hacker / int_2cd28570 | featureConfidence |
1.0 | |
Serial Experiments Lain | hasFeature |
Digitized Hacker / int_2cd28570 | |
Digitized Hacker / int_3c601190 | type |
Digitized Hacker | |
Digitized Hacker / int_3c601190 | comment |
The serial killer in Ghost in the Machine has his soul digitized by a freak electrical surge while he's inside an MRI machine as a result of a car accident. | |
Digitized Hacker / int_3c601190 | featureApplicability |
1.0 | |
Digitized Hacker / int_3c601190 | featureConfidence |
1.0 | |
Ghost in the Machine | hasFeature |
Digitized Hacker / int_3c601190 | |
Digitized Hacker / int_43a9c333 | type |
Digitized Hacker | |
Digitized Hacker / int_43a9c333 | comment |
The Cowboy Bebop episode "Brain Scratch" has one who is able to fabricate an identity and start a far-reaching Cult designed to turn everyone into Virtual Ghosts. | |
Digitized Hacker / int_43a9c333 | featureApplicability |
1.0 | |
Digitized Hacker / int_43a9c333 | featureConfidence |
1.0 | |
Cowboy Bebop | hasFeature |
Digitized Hacker / int_43a9c333 | |
Digitized Hacker / int_4522fd1 | type |
Digitized Hacker | |
Digitized Hacker / int_4522fd1 | comment |
In the Whateley Universe, there are at least two: Dr. Abel Palm, who wants to wipe out mankind so that computers can take over, ensorcels his own soul into a super-virus, making himself into a self-duplicating A.I.; and Merry, a cyberpath who can literally dive into the internet if even within a few feet of a decent-speed CPU chip that's on-line. | |
Digitized Hacker / int_4522fd1 | featureApplicability |
1.0 | |
Digitized Hacker / int_4522fd1 | featureConfidence |
1.0 | |
Whateley Universe | hasFeature |
Digitized Hacker / int_4522fd1 | |
Digitized Hacker / int_4857e853 | type |
Digitized Hacker | |
Digitized Hacker / int_4857e853 | comment |
In I Think We're All Bozos on This Bus, Clem lacks direct access to the central computer, so he creates a virtual avatar, the "Clem-clone", to invade Dr. Memory's domain. | |
Digitized Hacker / int_4857e853 | featureApplicability |
1.0 | |
Digitized Hacker / int_4857e853 | featureConfidence |
1.0 | |
I Think We're All Bozos on This Bus (Audio Play) | hasFeature |
Digitized Hacker / int_4857e853 | |
Digitized Hacker / int_4c095a1f | type |
Digitized Hacker | |
Digitized Hacker / int_4c095a1f | comment |
In an episode of The Transformers, Spike Witwicky has to become a Virtual Ghost while his body undergoes surgery and inadvertently drops into this trope temporarily. | |
Digitized Hacker / int_4c095a1f | featureApplicability |
1.0 | |
Digitized Hacker / int_4c095a1f | featureConfidence |
1.0 | |
The Transformers | hasFeature |
Digitized Hacker / int_4c095a1f | |
Digitized Hacker / int_4df70168 | type |
Digitized Hacker | |
Digitized Hacker / int_4df70168 | comment |
Exit Mundi suggests this as a possible apocalypse. | |
Digitized Hacker / int_4df70168 | featureApplicability |
1.0 | |
Digitized Hacker / int_4df70168 | featureConfidence |
1.0 | |
Exit Mundi (Website) | hasFeature |
Digitized Hacker / int_4df70168 | |
Digitized Hacker / int_5ec8cfe2 | type |
Digitized Hacker | |
Digitized Hacker / int_5ec8cfe2 | comment |
In All Fall Down, AIQ Squared proves a very capable one, since it's made of the same data as the software it scours for information on Siphon. | |
Digitized Hacker / int_5ec8cfe2 | featureApplicability |
1.0 | |
Digitized Hacker / int_5ec8cfe2 | featureConfidence |
1.0 | |
All Fall Down (Comic Book) | hasFeature |
Digitized Hacker / int_5ec8cfe2 | |
Digitized Hacker / int_6196490 | type |
Digitized Hacker | |
Digitized Hacker / int_6196490 | comment |
Ghost in the Shell: Many criminals in the anime, as well as Major Kusanagi herself in the movies and the second manga series Man-Machine Interface. Technically, any full-body cyborg is this while they're using the internet, since they're basically a Brain in a Jar with a mechanical body. In the second season of Ghost in the Shell: Stand Alone Complex, Kuze might have become one after being murdered by corrupt government agents. The Puppet Master is a variation on the trope. He is technically digitized, but only because he was never human to begin with. |
|
Digitized Hacker / int_6196490 | featureApplicability |
1.0 | |
Digitized Hacker / int_6196490 | featureConfidence |
1.0 | |
Ghost in the Shell (Franchise) | hasFeature |
Digitized Hacker / int_6196490 | |
Digitized Hacker / int_66394ca4 | type |
Digitized Hacker | |
Digitized Hacker / int_66394ca4 | comment |
The Dixie Flatline in Neuromancer was a legendary hacker in life, but after getting killed and recreated as a "construct", he really acts more as a tool for Case (comes with running on ROM instead of RAM). Wintermute and Neuromancer are A.I.s with known physical locations, but that doesn't stop them from reaching out as far as earth orbit or merging together while on opposite sides of the planet. | |
Digitized Hacker / int_66394ca4 | featureApplicability |
1.0 | |
Digitized Hacker / int_66394ca4 | featureConfidence |
1.0 | |
Neuromancer | hasFeature |
Digitized Hacker / int_66394ca4 | |
Digitized Hacker / int_694ab80 | type |
Digitized Hacker | |
Digitized Hacker / int_694ab80 | comment |
The Batman Beyond episode "Lost Soul" has a one-off villain like this: a computer mogul who had his brain digitized and eventually went mad after he was shut down for decades. His first item of business after he's rebooted and hooked up to the 'net: Flex his digital muscles by wreaking havoc in the city. Second order: Commandeer Terry's computerized suit to kidnap his grandson and upload himself into the younger body. | |
Digitized Hacker / int_694ab80 | featureApplicability |
1.0 | |
Digitized Hacker / int_694ab80 | featureConfidence |
1.0 | |
Batman Beyond | hasFeature |
Digitized Hacker / int_694ab80 | |
Digitized Hacker / int_6eb66eb7 | type |
Digitized Hacker | |
Digitized Hacker / int_6eb66eb7 | comment |
Domoverse: Glitch can project her mind into computers, and hack them, appearing as an angelic girl, reflecting her origins as a computer program. | |
Digitized Hacker / int_6eb66eb7 | featureApplicability |
1.0 | |
Digitized Hacker / int_6eb66eb7 | featureConfidence |
1.0 | |
Domoverse (Fanfic) | hasFeature |
Digitized Hacker / int_6eb66eb7 | |
Digitized Hacker / int_7560e8e0 | type |
Digitized Hacker | |
Digitized Hacker / int_7560e8e0 | comment |
TRON may be the Ur-Example or Unbuilt Trope as the Shiva laser (intended to be a teleporter) physically uploads the protagonist to Cyberspace, where he becomes a Physical God as far as that world's concerned. | |
Digitized Hacker / int_7560e8e0 | featureApplicability |
1.0 | |
Digitized Hacker / int_7560e8e0 | featureConfidence |
1.0 | |
TRON (Franchise) | hasFeature |
Digitized Hacker / int_7560e8e0 | |
Digitized Hacker / int_815220e8 | type |
Digitized Hacker | |
Digitized Hacker / int_815220e8 | comment |
Transformers: Armada has Sideways, who, among other things, can invade computers, mess with data, and sometimes suck others into cyberspace with him. He does have a physical robot body, when he feels like it. | |
Digitized Hacker / int_815220e8 | featureApplicability |
1.0 | |
Digitized Hacker / int_815220e8 | featureConfidence |
1.0 | |
Transformers: Armada | hasFeature |
Digitized Hacker / int_815220e8 | |
Digitized Hacker / int_84034d7f | type |
Digitized Hacker | |
Digitized Hacker / int_84034d7f | comment |
Pantheon: A U.I is a digital copy of a human mind that can freely move through cyberspace and meddle in any computer system. Laurie Lowell wrecks havoc on Logorythms after her transformation and David hacks Maddie's school to dish out some justice on the teens tormenting his daughter. | |
Digitized Hacker / int_84034d7f | featureApplicability |
1.0 | |
Digitized Hacker / int_84034d7f | featureConfidence |
1.0 | |
Pantheon | hasFeature |
Digitized Hacker / int_84034d7f | |
Digitized Hacker / int_9e10fbb4 | type |
Digitized Hacker | |
Digitized Hacker / int_9e10fbb4 | comment |
Otto, protagonist of the H.I.V.E. Series, develops this ability in book three to a limited degree and improves over the course of the series. He has a somewhat limited knowledge of computer programming, however, so when he tries to hack something he generally leaves an obvious trail. For this reason, when subtlety is required, Laura will do the hacking, but if it's an emergency Otto will retrieve any information the protagonists are after. | |
Digitized Hacker / int_9e10fbb4 | featureApplicability |
1.0 | |
Digitized Hacker / int_9e10fbb4 | featureConfidence |
1.0 | |
H.I.V.E. Series | hasFeature |
Digitized Hacker / int_9e10fbb4 | |
Digitized Hacker / int_a04210b3 | type |
Digitized Hacker | |
Digitized Hacker / int_a04210b3 | comment |
Digimon Story: Cyber Sleuth and Digimon Story: Cyber Sleuth - Hacker's Memory are set in a universe where people are able to physically log onto the Internet. Hackers are a major concern and part of the plot, with Digimon being used as hacking tools or to settle scores between competing hackers. The player characters are heroic hackers trying to stop less scrupulous ones from abusing their power, though even they have to do things like illegally invading systems sometimes (for the greater good, of course). | |
Digitized Hacker / int_a04210b3 | featureApplicability |
1.0 | |
Digitized Hacker / int_a04210b3 | featureConfidence |
1.0 | |
Digimon Story: Cyber Sleuth (Video Game) | hasFeature |
Digitized Hacker / int_a04210b3 | |
Digitized Hacker / int_a7bb29b1 | type |
Digitized Hacker | |
Digitized Hacker / int_a7bb29b1 | comment |
Cyber Peacock of Mega Man X4 was originally an A.I. that protected the network from hackers before being corrupted by Sigma. He then begins corrupting the network himself, to draw the Maverick Hunters attention as he was tasked to measure their potential. | |
Digitized Hacker / int_a7bb29b1 | featureApplicability |
1.0 | |
Digitized Hacker / int_a7bb29b1 | featureConfidence |
1.0 | |
Mega Man X4 (Video Game) | hasFeature |
Digitized Hacker / int_a7bb29b1 | |
Digitized Hacker / int_a8348fd0 | type |
Digitized Hacker | |
Digitized Hacker / int_a8348fd0 | comment |
Marcus Wall, one of the antagonists of the Matador Series, becomes this in The Albino Knife. His extra power just makes him more sadistic and unhinged, wreaking havoc across the galaxy as well as drawing his enemies into a trap. | |
Digitized Hacker / int_a8348fd0 | featureApplicability |
1.0 | |
Digitized Hacker / int_a8348fd0 | featureConfidence |
1.0 | |
Matador Series | hasFeature |
Digitized Hacker / int_a8348fd0 | |
Digitized Hacker / int_aadcf5f1 | type |
Digitized Hacker | |
Digitized Hacker / int_aadcf5f1 | comment |
In Rainbows End, it's strongly suggested that Mr. Rabbit is this, especially when, with moments to go before before his connection to the group beneath the lab is cut off, he manages to leave them with a detailed PDF document titled, "While We Are Out of Touch or How To Survive and Prosper During the Next Thirty Minutes", with explanations of the whole situation, who's responsible, what they can do about it, and much more. | |
Digitized Hacker / int_aadcf5f1 | featureApplicability |
1.0 | |
Digitized Hacker / int_aadcf5f1 | featureConfidence |
1.0 | |
Rainbows End | hasFeature |
Digitized Hacker / int_aadcf5f1 | |
Digitized Hacker / int_b2afdc9d | type |
Digitized Hacker | |
Digitized Hacker / int_b2afdc9d | comment |
The Chronicles of Darkness sourcebook Urban Legends has a phone hacker who died whilst crawling through a tunnel to access cables. His spirit now exists inside the phone network he loved, and can now control it to some extent (usually in the 'calls are coming from inside the house' sense). Whether he's a malevolent entity or helpful to the PCs is down to the GM. If the players actually find his body, what's left of it is riddled with cables and fused into the network. | |
Digitized Hacker / int_b2afdc9d | featureApplicability |
1.0 | |
Digitized Hacker / int_b2afdc9d | featureConfidence |
1.0 | |
Chronicles of Darkness (Tabletop Game) | hasFeature |
Digitized Hacker / int_b2afdc9d | |
Digitized Hacker / int_b4996199 | type |
Digitized Hacker | |
Digitized Hacker / int_b4996199 | comment |
Doctor Seward Trainer in Spider-Man was this for a while. It started when his mind was connected to the internet through a VR headset and zapped by a security program, which resulted in his mind being separated from his body and trapped in the net. Yeah, just go with it. The most significant thing to come from this was that Doctor Trainer created all the necessary electronic records to provide Ben Reilly a fabricated past. During this time Trainer's body was kept alive in a hospital, constantly hooked up to the internet in case his mind found a way back. | |
Digitized Hacker / int_b4996199 | featureApplicability |
1.0 | |
Digitized Hacker / int_b4996199 | featureConfidence |
1.0 | |
Spider-Man (Comic Book) | hasFeature |
Digitized Hacker / int_b4996199 | |
Digitized Hacker / int_bcb32dc6 | type |
Digitized Hacker | |
Digitized Hacker / int_bcb32dc6 | comment |
Shadowrun: In the "Dragon Heart Saga" novels, set in the 1st Ed. of the setting, Alice Haeffner (President Haeffner's late wife) was a technology researcher back when cyberspace was in development. However, she died fighting the virus that caused the old internet to crash, which itself lead to the creation of the Matrix. Incidentally, a matrix persona popped up not long after, which goes by the name of "Alice" and is Alice Haeffner's spitting image. The new Alice is both a master decker and an successful infobroker, as well as the subject to a prevalent urban legend among tech specialists that she is the digitized conscious of Alice Haeffner. Commentary and information from several sources can be picked up in the comments on various sourcebooks, especially Matrix-oriented ones. Alices's true nature was left ambiguous for a time, as well as several extremely technologically-savvy deckers pointing out that The Matrix does not work that way (though if they were right or not was ultimately the GM's decision). However, more "e-ghosts" started popping up after people died while on the matrix pretty much confirmed that it was the original and continuing Alice. In the second, unwired iteration of the matrix, the problem just got more complicated after e-ghosts of still-living people started showing up. Even in the 2080's, 50 years after Alice's physical body died, it's still a rare and poorly understood phenomenon. Then there's also the A.I.s. The three "big" A.I.s were able to manipulate the Matrix easily and just by thinking about it. The big three allegedly died during the Crash 2.0, but in the new Matrix, much less powerful A.I.s of several sorts have started showing up. Though they can manipulate the Matrix, it's diffuse and decentralized nature makes manipulating it and generally existing on it much harder, so they require being inside a host or a device to work effectively. With the proliferation of A.I. entities, e-ghosts have been grouped with them for classification, and it does seem like a fair decision. Then comes the Otaku and Technomancers, beings who can manipulate the matrix with their mind. The Otaku of the wired matrix era avert this trope, since they required a wired connection; and Technomancers downplay this trope, since their brains are natural matrix devices which let them hack or fully go into the matrix by thinking it. To an even lesser extent, deckers can do this too, in the wireless matrix. Fully diving into the matrix is practically digital astral projection. Last, and least, are Agents, Pilots, and Intrusion Countermeasures, and other types of computer programs that are capable of pulling a hack if programmed to be able to do so. While they fit this trope, they are little more than computer programs, unless it happens to achieve sentience and becomes an A.I. entity. |
|
Digitized Hacker / int_bcb32dc6 | featureApplicability |
1.0 | |
Digitized Hacker / int_bcb32dc6 | featureConfidence |
1.0 | |
Shadowrun (Tabletop Game) | hasFeature |
Digitized Hacker / int_bcb32dc6 | |
Digitized Hacker / int_c436d57e | type |
Digitized Hacker | |
Digitized Hacker / int_c436d57e | comment |
Cyberjack: The bad guy Nassim wants to steal a super-virus from a computer lab so he can merge with it and Take Over the World. This works at first as he develops telepathic powers, but when Nick shoots him in the head he goes One-Winged Angel and infects the computer systems as a sentient virus. The heroes solve this by basically deleting him. | |
Digitized Hacker / int_c436d57e | featureApplicability |
1.0 | |
Digitized Hacker / int_c436d57e | featureConfidence |
1.0 | |
Cyberjack | hasFeature |
Digitized Hacker / int_c436d57e | |
Digitized Hacker / int_c43df4d8 | type |
Digitized Hacker | |
Digitized Hacker / int_c43df4d8 | comment |
Doctor Who: In "Time Heist", Psi is an "augmented human" with visible computer chips embedded in his head, recruited for a bank heist due to his hacking skills. | |
Digitized Hacker / int_c43df4d8 | featureApplicability |
1.0 | |
Digitized Hacker / int_c43df4d8 | featureConfidence |
1.0 | |
Doctor Who | hasFeature |
Digitized Hacker / int_c43df4d8 | |
Digitized Hacker / int_c7fe972d | type |
Digitized Hacker | |
Digitized Hacker / int_c7fe972d | comment |
The plotline of TRON 2.0 is about a rival corporation trying to obtain Encom's digitizing technology to turn mercenaries into Datawraiths in order to steal and control all of Cyberspace. The primary villains turn into Digital Abominations when they digitize themselves without the safeties Alan coded into Ma3a. | |
Digitized Hacker / int_c7fe972d | featureApplicability |
1.0 | |
Digitized Hacker / int_c7fe972d | featureConfidence |
1.0 | |
TRON 2.0 (Video Game) | hasFeature |
Digitized Hacker / int_c7fe972d | |
Digitized Hacker / int_d109f322 | type |
Digitized Hacker | |
Digitized Hacker / int_d109f322 | comment |
Seamus Harper sometimes inspects the computer system of Andromeda this way. | |
Digitized Hacker / int_d109f322 | featureApplicability |
1.0 | |
Digitized Hacker / int_d109f322 | featureConfidence |
1.0 | |
Andromeda | hasFeature |
Digitized Hacker / int_d109f322 | |
Digitized Hacker / int_d4d633b7 | type |
Digitized Hacker | |
Digitized Hacker / int_d4d633b7 | comment |
Alex from Code 7 is this, since Brain Uploading and Dead All Along end with them literally inside the computer. | |
Digitized Hacker / int_d4d633b7 | featureApplicability |
1.0 | |
Digitized Hacker / int_d4d633b7 | featureConfidence |
1.0 | |
Code 7 (Video Game) | hasFeature |
Digitized Hacker / int_d4d633b7 | |
Digitized Hacker / int_d64a9ab5 | type |
Digitized Hacker | |
Digitized Hacker / int_d64a9ab5 | comment |
Batman: Beyond the White Knight: The Jack Napier AI in Bruce's head can connect wirelessly with anything around him, allowing him to take control of any device. | |
Digitized Hacker / int_d64a9ab5 | featureApplicability |
1.0 | |
Digitized Hacker / int_d64a9ab5 | featureConfidence |
1.0 | |
Batman: Beyond the White Knight (Comic Book) | hasFeature |
Digitized Hacker / int_d64a9ab5 | |
Digitized Hacker / int_d6c9c0a4 | type |
Digitized Hacker | |
Digitized Hacker / int_d6c9c0a4 | comment |
Many criminals in the anime, as well as Major Kusanagi herself in the movies and the second manga series Man-Machine Interface. Technically, any full-body cyborg is this while they're using the internet, since they're basically a Brain in a Jar with a mechanical body. In the second season of Ghost in the Shell: Stand Alone Complex, Kuze might have become one after being murdered by corrupt government agents. | |
Digitized Hacker / int_d6c9c0a4 | featureApplicability |
1.0 | |
Digitized Hacker / int_d6c9c0a4 | featureConfidence |
1.0 | |
Ghost in the Shell: Stand Alone Complex | hasFeature |
Digitized Hacker / int_d6c9c0a4 | |
Digitized Hacker / int_e293455a | type |
Digitized Hacker | |
Digitized Hacker / int_e293455a | comment |
Buffy the Vampire Slayer: In "I Robot, You Jane", when the computer club starts digitally backing up the school library, they scan a book containing the spirit of a demon, releasing him onto the Internet (Giles really needs to be more careful with his Tomes of Eldritch Lore). When the main cast find out, it doesn't take them long to realize what he's capable of. | |
Digitized Hacker / int_e293455a | featureApplicability |
1.0 | |
Digitized Hacker / int_e293455a | featureConfidence |
1.0 | |
Buffy the Vampire Slayer | hasFeature |
Digitized Hacker / int_e293455a | |
Digitized Hacker / int_e863cc41 | type |
Digitized Hacker | |
Digitized Hacker / int_e863cc41 | comment |
Mega Man Battle Network is all about this, namely with enemy NetNavis. | |
Digitized Hacker / int_e863cc41 | featureApplicability |
1.0 | |
Digitized Hacker / int_e863cc41 | featureConfidence |
1.0 | |
Mega Man Battle Network (Video Game) | hasFeature |
Digitized Hacker / int_e863cc41 | |
Digitized Hacker / int_ea377bc0 | type |
Digitized Hacker | |
Digitized Hacker / int_ea377bc0 | comment |
The Hacker in System Shock can do this thanks to some nifty new cyborg upgrades. In fact, the Final Boss (an insane A.I.) is fought in cyberspace, with the Hacker attempting to delete her main program while she attempts to overwrite his mind in return. | |
Digitized Hacker / int_ea377bc0 | featureApplicability |
1.0 | |
Digitized Hacker / int_ea377bc0 | featureConfidence |
1.0 | |
System Shock (Video Game) | hasFeature |
Digitized Hacker / int_ea377bc0 | |
Digitized Hacker / int_ee04f49a | type |
Digitized Hacker | |
Digitized Hacker / int_ee04f49a | comment |
Deus Ex Universe: Zig-zagged in Deus Ex. The ultimate goal of the Big Bad is to use nanorobotic augmentations to fully integrate his brain with the A.I. Helios, which has the ability to directly control almost any electronic device imaginable. The latter includes a number of universal constructors, machines capable of creating anything and everything by manipulating matter on a sub-atomic level, effectively turning him into a god. Unfortunately for him, the A.I. rebels and merges with the protagonist instead, allowing him to control the world as a benevolent dictator. Subverted in Deus Ex: Invisible War when it's revealed that the merger didn't work. One of the endings, however, sees the protagonist from the previous game successfully merge with the A.I., which renders him capable of controlling the world's now ubiquitous nanotechnology, which, combined with the also ubiquitous universal constructors, renders him immortal and enables him to do literally anything. Fortunately, his goal is still to be a benevolent dictator, and his plans for the world are in many ways infinitely preferable to some or all of the other factions' goals. |
|
Digitized Hacker / int_ee04f49a | featureApplicability |
-0.3 | |
Digitized Hacker / int_ee04f49a | featureConfidence |
1.0 | |
Deus Ex Universe (Franchise) | hasFeature |
Digitized Hacker / int_ee04f49a | |
Digitized Hacker / int_ef8bd4a5 | type |
Digitized Hacker | |
Digitized Hacker / int_ef8bd4a5 | comment |
Mega Man: Mega Man Battle Network is all about this, namely with enemy NetNavis. Cyber Peacock of Mega Man X4 was originally an A.I. that protected the network from hackers before being corrupted by Sigma. He then begins corrupting the network himself, to draw the Maverick Hunters attention as he was tasked to measure their potential. |
|
Digitized Hacker / int_ef8bd4a5 | featureApplicability |
1.0 | |
Digitized Hacker / int_ef8bd4a5 | featureConfidence |
1.0 | |
Mega Man (Franchise) | hasFeature |
Digitized Hacker / int_ef8bd4a5 | |
Digitized Hacker / int_f6a1016f | type |
Digitized Hacker | |
Digitized Hacker / int_f6a1016f | comment |
And then there's The Matrix trilogy. While the main characters themselves technically qualify, the only character that actually hacks into other beings' minds is the former Agent Smith when he copies himself. He even takes over a human outside of the Matrix. | |
Digitized Hacker / int_f6a1016f | featureApplicability |
1.0 | |
Digitized Hacker / int_f6a1016f | featureConfidence |
1.0 | |
The Matrix (Franchise) | hasFeature |
Digitized Hacker / int_f6a1016f | |
Digitized Hacker / int_f74b5f80 | type |
Digitized Hacker | |
Digitized Hacker / int_f74b5f80 | comment |
Babylon 5: In "The Deconstruction of Falling Stars", the future Earth government accidentally creates one of these by recreating the Babylon Five command staff as holograms while trying to create a propaganda hit-piece. Garibaldi's hologram manages to become this trope, hack the computer simulating him, trick the presenter into an Engineered Public Confession and broadcast everything to the opposition EarthGov is trying to smear. | |
Digitized Hacker / int_f74b5f80 | featureApplicability |
1.0 | |
Digitized Hacker / int_f74b5f80 | featureConfidence |
1.0 | |
Babylon 5 | hasFeature |
Digitized Hacker / int_f74b5f80 | |
Digitized Hacker / int_fa5e90fd | type |
Digitized Hacker | |
Digitized Hacker / int_fa5e90fd | comment |
City of Heroes: The game features a helpful Digitized Hacker in Doctor Friedkin, who plays Voice with an Internet Connection backup for those trying to take down the people that forced her into the network in the first place. Played horrifically straight with Metronome in the Going Rogue expansion. Initially introduced as a series of the common Clockwork robots operating oddly independently and speaking normal English rather than machine code, the arc later reveals this behavior to be caused by the psychic imprint of the Clockwork's dead creator, merged with the Clockwork network somehow after he was murdered by Praetor Keyes/Anti-Matter so Keyes could take sole credit for the Clockwork. Metronome is later revealed to have been merged with Clockwork as a psychic imprint "ghost" that can telepathically possess any Clockwork, which was done by Penelope Yin as an Emergency Transformation to keep him alive. Later on, it's revealed that the Syndicate is feeding him the souls of psychic Seers to increase the level of his power so he can control the entire Clockwork network and dethrone Emperor Cole. You eventually have to defeat him to prevent him from seizing Emperor Cole's army of War Walkers that are under construction. |
|
Digitized Hacker / int_fa5e90fd | featureApplicability |
1.0 | |
Digitized Hacker / int_fa5e90fd | featureConfidence |
1.0 | |
City of Heroes (Video Game) | hasFeature |
Digitized Hacker / int_fa5e90fd |
The following is a list of statements referring to the current page from other pages.
Copyright of DBTropes.org wrapper 2009-2013 DFKI Knowledge Management. Imprint. - Thanks to Bakken&Baeck for hosting. Contact.
Copyright of data TVTropes.org contributors under Creative Commons Attribution-Share Alike 3.0 Unported License.
Copyright of data TVTropes.org contributors under Creative Commons Attribution-Share Alike 3.0 Unported License.