...it's like TV Tropes, but LINKED DATA!
Dueling Hackers
- 235 statements
- 43 feature instances
- 44 referencing feature instances
Dueling Hackers | type |
FeatureClass | |
Dueling Hackers | label |
Dueling Hackers | |
Dueling Hackers | page |
DuelingHackers | |
Dueling Hackers | comment |
A head-to-head confrontation between two computer hackers, combining the excitement of people typing with the thrill of network protocol loopholes being exploited. One hacker is trying to penetrate a computer system while the second is busily trying to keep the first one out. Expect the hackers to consider each other to be a Worthy Opponent. Often mixed with an attempt to back-trace the invading Hacker's source, depicted much like phone back-tracing usually is. Expect plenty of Hollywood Hacking jargon and visuals to keep the audience occupied. Almost no one thinks to simply unplug the target computer from the network because apparently Everything Is Online, always. Also worth noting is that in reality, if hackers have identified each other, whoever has root access (or is closer than the other one) can simply deny the other one access to absolutely everything. By default, this means that if either hacker is the home security, they automatically win the moment they know the hacker exists. This is why in reality, hacking is all about stealth (hence the common phrases like "trojan horse" and "worm") Can overlap with Rival Science Teams, if the Dueling Hackers are working for scientists, or are scientists themselves. |
|
Dueling Hackers | fetched |
2024-01-18T15:00:40Z | |
Dueling Hackers | parsed |
2024-01-18T15:00:40Z | |
Dueling Hackers | processingComment |
Dropped link to ClassyCatBurglar: Not an Item - FEATURE | |
Dueling Hackers | processingComment |
Dropped link to CurbStompBattle: Not an Item - FEATURE | |
Dueling Hackers | processingComment |
Dropped link to CyberPunk: Not an Item - FEATURE | |
Dueling Hackers | processingComment |
Dropped link to Cyberspace: Not an Item - FEATURE | |
Dueling Hackers | processingComment |
Dropped link to DuelingHackers: Not an Item - FEATURE | |
Dueling Hackers | processingComment |
Dropped link to FlameWar: Not an Item - FEATURE | |
Dueling Hackers | processingComment |
Dropped link to HackingMinigame: Not an Item - FEATURE | |
Dueling Hackers | processingComment |
Dropped link to MeetCute: Not an Item - FEATURE | |
Dueling Hackers | processingComment |
Dropped link to MundaneSolution: Not an Item - FEATURE | |
Dueling Hackers | processingComment |
Dropped link to WhoAmI2014: Not an Item - UNKNOWN | |
Dueling Hackers | processingComment |
Dropped link to YourMindMakesItReal: Not an Item - FEATURE | |
Dueling Hackers | processingComment |
Dropped link to spiritualsuccessor: Not an Item - FEATURE | |
Dueling Hackers | processingUnknown |
Who Am I (2014) | |
Dueling Hackers | isPartOf |
DBTropes | |
Dueling Hackers / int_11859033 | type |
Dueling Hackers | |
Dueling Hackers / int_11859033 | comment |
In Narbonic, Dave got into one of these with Lovelace before the beginning of Professor Madblood and the Lovelace Affair. He's sad when she turns out to be better at it than he is, but then they start talking... It wasn't his fault. She's an AI. | |
Dueling Hackers / int_11859033 | featureApplicability |
1.0 | |
Dueling Hackers / int_11859033 | featureConfidence |
1.0 | |
Narbonic (Webcomic) | hasFeature |
Dueling Hackers / int_11859033 | |
Dueling Hackers / int_1d97f2e9 | type |
Dueling Hackers | |
Dueling Hackers / int_1d97f2e9 | comment |
In Invisible Apartment, the protagonist tries to go after a hacker who nearly got her caught, but since the hacker can't be tracked directly, the "duel" eventually involves physically trying to track down the actual locations from which the other hacker could connecting. | |
Dueling Hackers / int_1d97f2e9 | featureApplicability |
1.0 | |
Dueling Hackers / int_1d97f2e9 | featureConfidence |
1.0 | |
Invisible Apartment (Visual Novel) | hasFeature |
Dueling Hackers / int_1d97f2e9 | |
Dueling Hackers / int_22119589 | type |
Dueling Hackers | |
Dueling Hackers / int_22119589 | comment |
On Alias Marshall (the resident Omnidisciplinary Nerd) was in a hacking duel at least once, as someone tried to break into SD6's system. | |
Dueling Hackers / int_22119589 | featureApplicability |
1.0 | |
Dueling Hackers / int_22119589 | featureConfidence |
1.0 | |
Alias | hasFeature |
Dueling Hackers / int_22119589 | |
Dueling Hackers / int_22147342 | type |
Dueling Hackers | |
Dueling Hackers / int_22147342 | comment |
Arrow: The episode "Time of Death" is all about this, with Felicity engaging in a hacking war with the Clock King. Two seasons later in "Unchained", she gets into it again with the Calculator, who is revealed to be her Disappeared Dad, and so in the season finale she teams up with him to stop HIVE from hacking into the world's nuclear missiles to destroy the world, only to find they're using her hackivist ex-boyfriend from college to counter-hack them. |
|
Dueling Hackers / int_22147342 | featureApplicability |
1.0 | |
Dueling Hackers / int_22147342 | featureConfidence |
1.0 | |
Arrow | hasFeature |
Dueling Hackers / int_22147342 | |
Dueling Hackers / int_222c2051 | type |
Dueling Hackers | |
Dueling Hackers / int_222c2051 | comment |
In "Chuck Versus the Hack-Off", Chuck has to participate in the episode's titular "hack-off" (a competition where hackers have to outduel their competition) in order to get some dirt on the villain of the week. | |
Dueling Hackers / int_222c2051 | featureApplicability |
1.0 | |
Dueling Hackers / int_222c2051 | featureConfidence |
1.0 | |
Chuck | hasFeature |
Dueling Hackers / int_222c2051 | |
Dueling Hackers / int_2437e7cc | type |
Dueling Hackers | |
Dueling Hackers / int_2437e7cc | comment |
In Gakuen Heaven of all things the vice-presidents of the student council and the treasury are constantly trying to hack each other and keep the other out. | |
Dueling Hackers / int_2437e7cc | featureApplicability |
1.0 | |
Dueling Hackers / int_2437e7cc | featureConfidence |
1.0 | |
Gakuen Heaven (Visual Novel) | hasFeature |
Dueling Hackers / int_2437e7cc | |
Dueling Hackers / int_25305527 | type |
Dueling Hackers | |
Dueling Hackers / int_25305527 | comment |
A slowed down and scaled up version: The .hack plot-lines for the Twilight manga and anime involve a group of hackers breaking down an MMORPG while the game's programmers try and counter the slow infection. | |
Dueling Hackers / int_25305527 | featureApplicability |
1.0 | |
Dueling Hackers / int_25305527 | featureConfidence |
1.0 | |
.hack (Franchise) | hasFeature |
Dueling Hackers / int_25305527 | |
Dueling Hackers / int_31ea2c8f | type |
Dueling Hackers | |
Dueling Hackers / int_31ea2c8f | comment |
Kyle and Jessi do this in a second-season episode of Kyle XY. | |
Dueling Hackers / int_31ea2c8f | featureApplicability |
1.0 | |
Dueling Hackers / int_31ea2c8f | featureConfidence |
1.0 | |
Kyle XY | hasFeature |
Dueling Hackers / int_31ea2c8f | |
Dueling Hackers / int_334f9ddc | type |
Dueling Hackers | |
Dueling Hackers / int_334f9ddc | comment |
In Injustice: Gods Among Us, when the Alternate Universe Cyborg (who's working with Superman) finds his Main Universe counterpart trying to hack into the Watchtower's teleporters (and having beaten alternate Catwoman in the meantime), he sends a virus to his systems to hold him in place. Cyborg immediately counters by hacking into his double's systems to do the same. They stand before each other, using holographic screens to hack into the other's cybernetics for a good while, until they decide that isn't working and go on to just beat the crap out of each other. | |
Dueling Hackers / int_334f9ddc | featureApplicability |
1.0 | |
Dueling Hackers / int_334f9ddc | featureConfidence |
1.0 | |
Injustice: Gods Among Us (Video Game) | hasFeature |
Dueling Hackers / int_334f9ddc | |
Dueling Hackers / int_33fd91eb | type |
Dueling Hackers | |
Dueling Hackers / int_33fd91eb | comment |
Part of the climax of Hackers. Also the scene where Dade tries to take over the TV studio. In reality, it's two robot arms trading a videotape. In Hollywood it's two titans meeting on the battlefield, if the kung fu clips interspersed with the robot arms and neat visual effects surrounding Dade's head are supposed to mean anything. | |
Dueling Hackers / int_33fd91eb | featureApplicability |
1.0 | |
Dueling Hackers / int_33fd91eb | featureConfidence |
1.0 | |
Hackers | hasFeature |
Dueling Hackers / int_33fd91eb | |
Dueling Hackers / int_3662453e | type |
Dueling Hackers | |
Dueling Hackers / int_3662453e | comment |
In Resident Evil (2002), Kaplan has a hacking duel with the Red Queen AI to bypass her defenses. | |
Dueling Hackers / int_3662453e | featureApplicability |
1.0 | |
Dueling Hackers / int_3662453e | featureConfidence |
1.0 | |
Resident Evil (2002) | hasFeature |
Dueling Hackers / int_3662453e | |
Dueling Hackers / int_43339c8b | type |
Dueling Hackers | |
Dueling Hackers / int_43339c8b | comment |
Birds of Prey: Oracle and Calculator faced each other online several times. Typically, it was to get the other's location so they could send superhuman agents to arrest/kill each other. | |
Dueling Hackers / int_43339c8b | featureApplicability |
1.0 | |
Dueling Hackers / int_43339c8b | featureConfidence |
1.0 | |
Birds of Prey (Comic Book) | hasFeature |
Dueling Hackers / int_43339c8b | |
Dueling Hackers / int_457b671e | type |
Dueling Hackers | |
Dueling Hackers / int_457b671e | comment |
A legendary duel occurs early in Season 7 of 24 between Chloe and Janis. | |
Dueling Hackers / int_457b671e | featureApplicability |
1.0 | |
Dueling Hackers / int_457b671e | featureConfidence |
1.0 | |
24 | hasFeature |
Dueling Hackers / int_457b671e | |
Dueling Hackers / int_4f115950 | type |
Dueling Hackers | |
Dueling Hackers / int_4f115950 | comment |
Robin: Tim ends up in a hacker duel with a hacker the Joker kidnapped in "Joker's Wild". When it becomes clear that the kidnapped hacker is trying to hack into the batcave's systems and won't be of any aid in his own rescue Tim cuts the power to the batcomputer. | |
Dueling Hackers / int_4f115950 | featureApplicability |
1.0 | |
Dueling Hackers / int_4f115950 | featureConfidence |
1.0 | |
Robin (1993) (Comic Book) | hasFeature |
Dueling Hackers / int_4f115950 | |
Dueling Hackers / int_5ada53ed | type |
Dueling Hackers | |
Dueling Hackers / int_5ada53ed | comment |
The James Bond film GoldenEye has a world map where the audience can see how the tracing back of the hacker works (in Hollywood!). The backtracing map is trivial to implement (traceroute, GeoIP, Google Maps, whatever takes your fancy), its just that fancy Viewer Friendly Interfaces tend to get in the way of most useful network administration or abusing activities. Also, Playful Hacker Boris kills time by hacking into Western computers and taunting his opponents as they try to thwart him. He even thinks of unplugging his computer in the end, when he gets hacked back. He doesn't just pull the cable out though, but rips out whole racks of gear and throws them on the floor. | |
Dueling Hackers / int_5ada53ed | featureApplicability |
1.0 | |
Dueling Hackers / int_5ada53ed | featureConfidence |
1.0 | |
James Bond | hasFeature |
Dueling Hackers / int_5ada53ed | |
Dueling Hackers / int_5c600b17 | type |
Dueling Hackers | |
Dueling Hackers / int_5c600b17 | comment |
While it wasn't precisely done by hackers (mostly), the Digimon Adventure movie introducing Diablomon featured a fight between the viral creature and the hero 'mons... IN CYBERSPACE. | |
Dueling Hackers / int_5c600b17 | featureApplicability |
1.0 | |
Dueling Hackers / int_5c600b17 | featureConfidence |
1.0 | |
Digimon Adventure | hasFeature |
Dueling Hackers / int_5c600b17 | |
Dueling Hackers / int_6196490 | type |
Dueling Hackers | |
Dueling Hackers / int_6196490 | comment |
Ghost in the Shell has a few examples. It also averts the trope in Solid State Society. Section 9 actually does cut the power when they start getting hacked (via fire axe to the power cords). | |
Dueling Hackers / int_6196490 | featureApplicability |
1.0 | |
Dueling Hackers / int_6196490 | featureConfidence |
1.0 | |
Ghost in the Shell (Franchise) | hasFeature |
Dueling Hackers / int_6196490 | |
Dueling Hackers / int_64494e71 | type |
Dueling Hackers | |
Dueling Hackers / int_64494e71 | comment |
During the Chairman arc of Walker, Texas Ranger, at one point the hacker working for the Big Bad and the one on Walker's team (who have some prior history between them) get into a duel while trying to crash Walker's plane and trying to save it respectively. | |
Dueling Hackers / int_64494e71 | featureApplicability |
1.0 | |
Dueling Hackers / int_64494e71 | featureConfidence |
1.0 | |
Walker, Texas Ranger | hasFeature |
Dueling Hackers / int_64494e71 | |
Dueling Hackers / int_699dbb95 | type |
Dueling Hackers | |
Dueling Hackers / int_699dbb95 | comment |
Parodied in the Door Monster skit Hacker Fight, appropriately. The two sides duel using Hollywood Hacking techniques only, such as sunglasses and multiple screens. | |
Dueling Hackers / int_699dbb95 | featureApplicability |
1.0 | |
Dueling Hackers / int_699dbb95 | featureConfidence |
1.0 | |
Door Monster (Web Video) | hasFeature |
Dueling Hackers / int_699dbb95 | |
Dueling Hackers / int_6f734712 | type |
Dueling Hackers | |
Dueling Hackers / int_6f734712 | comment |
Smallville, as Chloe tries to keep hackers out of Watchtower. | |
Dueling Hackers / int_6f734712 | featureApplicability |
1.0 | |
Dueling Hackers / int_6f734712 | featureConfidence |
1.0 | |
Smallville | hasFeature |
Dueling Hackers / int_6f734712 | |
Dueling Hackers / int_791f9a4a | type |
Dueling Hackers | |
Dueling Hackers / int_791f9a4a | comment |
Bubblegum Crisis: In the eighth and final episode of the original series, Nene, the Hackette of the Knight Sabers, is caught in the middle of a "Die Hard" on an X situation at A.D. Police headquarters caused by a disgruntled scientist and the hero hunter boomers he created — one of which physically merges with the ADP's main server and takes control of the building. Once Nene's teammates come to the rescue, Nene has to battle the hacker boomer in order to escort the police chief's daughter to safety, opening locked doors and overriding building defenses all the while. After the other boomers are defeated, Nene has to prevent the hacker boomer from self-destructing the headquarters building. | |
Dueling Hackers / int_791f9a4a | featureApplicability |
1.0 | |
Dueling Hackers / int_791f9a4a | featureConfidence |
1.0 | |
Bubblegum Crisis | hasFeature |
Dueling Hackers / int_791f9a4a | |
Dueling Hackers / int_80b01c30 | type |
Dueling Hackers | |
Dueling Hackers / int_80b01c30 | comment |
Hanaukyō Maid Team. In episode 8 the Jihiyou family hacks into the MEMOL supercomputer to steal information (and possibly activate the mansion's Self-Destruct Mechanism). Grace manages to defeat them. | |
Dueling Hackers / int_80b01c30 | featureApplicability |
1.0 | |
Dueling Hackers / int_80b01c30 | featureConfidence |
1.0 | |
Hanaukyō Maid Team (Manga) | hasFeature |
Dueling Hackers / int_80b01c30 | |
Dueling Hackers / int_85e929e7 | type |
Dueling Hackers | |
Dueling Hackers / int_85e929e7 | comment |
Mohawked cyber-hacker Gogul was kept out of the action of the first episode of Cyber City OEDO 808 by being constantly engaged in a hacking duel against the "virtual ghost" who was fighting him for control of not only the functions of the massive Oedo skyscraper the episode was set in (including the gyroscope that kept the ridiculously-tall structure stable), but also the 30 gigawatt satellite laser canon orbiting overhead, leaving Sengoku and Benten to handle all the physical stuff. | |
Dueling Hackers / int_85e929e7 | featureApplicability |
1.0 | |
Dueling Hackers / int_85e929e7 | featureConfidence |
1.0 | |
Cyber City Oedo 808 | hasFeature |
Dueling Hackers / int_85e929e7 | |
Dueling Hackers / int_876cd173 | type |
Dueling Hackers | |
Dueling Hackers / int_876cd173 | comment |
This naturally occurs several times in Watch_Dogs and its sequel, most notably with Defalt and Lenni respectively. In a variation on the trope, there are also physical confrontations on top of the digital contests. | |
Dueling Hackers / int_876cd173 | featureApplicability |
1.0 | |
Dueling Hackers / int_876cd173 | featureConfidence |
1.0 | |
Watch_Dogs (Video Game) | hasFeature |
Dueling Hackers / int_876cd173 | |
Dueling Hackers / int_8d81bb26 | type |
Dueling Hackers | |
Dueling Hackers / int_8d81bb26 | comment |
Used quite often in NCIS, predominantly with Abby and/or McGee against any villain of the week who has a modicum of techno savvy who is trying to hack them. Subverted in one episode where Gibbs, who is notoriously bad with technology and especially computers, does, in fact, simply pull the plug when the aforementioned brainy duo are being overwhelmed by a particularly skilled hacker. In fairness, the reason they can't typically do that is because they need that computer online to do whatever they were doing on it in the first place. Especially since it's frequently time-sensitive. When in doubt, have two people type at once for double the hack potential! |
|
Dueling Hackers / int_8d81bb26 | featureApplicability |
-0.3 | |
Dueling Hackers / int_8d81bb26 | featureConfidence |
1.0 | |
NCIS | hasFeature |
Dueling Hackers / int_8d81bb26 | |
Dueling Hackers / int_ab67d84 | type |
Dueling Hackers | |
Dueling Hackers / int_ab67d84 | comment |
Ctrl+Alt+Del: Scott battles with The Master for control of Zeke. | |
Dueling Hackers / int_ab67d84 | featureApplicability |
1.0 | |
Dueling Hackers / int_ab67d84 | featureConfidence |
1.0 | |
Ctrl+Alt+Del (Webcomic) | hasFeature |
Dueling Hackers / int_ab67d84 | |
Dueling Hackers / int_ac484a35 | type |
Dueling Hackers | |
Dueling Hackers / int_ac484a35 | comment |
Happens often enough in Den-noh Coil, since realspace and cyberspace are linked. A particularly heated one happens between Isako and Fumie early on. | |
Dueling Hackers / int_ac484a35 | featureApplicability |
1.0 | |
Dueling Hackers / int_ac484a35 | featureConfidence |
1.0 | |
Den-noh Coil | hasFeature |
Dueling Hackers / int_ac484a35 | |
Dueling Hackers / int_b712435c | type |
Dueling Hackers | |
Dueling Hackers / int_b712435c | comment |
Leverage : Hardison got into one of these in "The Two Live Crew Job". Bonus points for the fact that the antagonist is played by Wil Wheaton. When they re-match later in the episode, Chaos uses the oft-mentioned Mundane Solution (Cut the Juice) on Hardison's rig in his van. Hardison had already set up a hand-cranked generator so he could restart all his equipment and come back online to save the day Parker also had a pickpocketing duel with her opposite number as well. This ends up backfiring, as the guy suddenly finds a lot of his stuff missing and immediately orders a lockdown. |
|
Dueling Hackers / int_b712435c | featureApplicability |
1.0 | |
Dueling Hackers / int_b712435c | featureConfidence |
1.0 | |
Leverage | hasFeature |
Dueling Hackers / int_b712435c | |
Dueling Hackers / int_b9419bd1 | type |
Dueling Hackers | |
Dueling Hackers / int_b9419bd1 | comment |
According to emails in Deus Ex: Human Revolution, Pritchard aka "Nucl3arsnake" got into one of these with Arie van Bruggen aka "Windmill". Pritchard managed to hold his own and would have won if Windmill hadn't discovered Sarif's hidden backdoor access. | |
Dueling Hackers / int_b9419bd1 | featureApplicability |
1.0 | |
Dueling Hackers / int_b9419bd1 | featureConfidence |
1.0 | |
Deus Ex: Human Revolution (Video Game) | hasFeature |
Dueling Hackers / int_b9419bd1 | |
Dueling Hackers / int_bac46af6 | type |
Dueling Hackers | |
Dueling Hackers / int_bac46af6 | comment |
The Core treated Rat's interaction with security systems this way, as though he were dueling with the security programmer. After breaking into DESTINI and shutting it down, "Your kung fu is not strong." | |
Dueling Hackers / int_bac46af6 | featureApplicability |
1.0 | |
Dueling Hackers / int_bac46af6 | featureConfidence |
1.0 | |
The Core | hasFeature |
Dueling Hackers / int_bac46af6 | |
Dueling Hackers / int_c0616d7b | type |
Dueling Hackers | |
Dueling Hackers / int_c0616d7b | comment |
In Ghost 1.0, this is the premise of the Final Battle - Viktor's coder trying to disable the shield around Ghost's brain, while Jacker tries to scramble the brains' ID numbers so that no one will be able to tell which one belongs to Ghost ever again. | |
Dueling Hackers / int_c0616d7b | featureApplicability |
1.0 | |
Dueling Hackers / int_c0616d7b | featureConfidence |
1.0 | |
Ghost 1.0 (Video Game) | hasFeature |
Dueling Hackers / int_c0616d7b | |
Dueling Hackers / int_c43df4d8 | type |
Dueling Hackers | |
Dueling Hackers / int_c43df4d8 | comment |
In the Doctor Who episode "The Bells of Saint John", the Doctor engages in this with the Shard organization when he hacks and reverses an upload of Clara's soul. | |
Dueling Hackers / int_c43df4d8 | featureApplicability |
1.0 | |
Dueling Hackers / int_c43df4d8 | featureConfidence |
1.0 | |
Doctor Who | hasFeature |
Dueling Hackers / int_c43df4d8 | |
Dueling Hackers / int_c75d67d | type |
Dueling Hackers | |
Dueling Hackers / int_c75d67d | comment |
Generally averted in Person of Interest. Most hacking affairs are entirely one-directional with the hacker working against the system security and either succeeding or failing to reach their objective. In the three cases where an enemy counter-hacks, the situation is generally resolved by powering down the hacking device or destroying it. | |
Dueling Hackers / int_c75d67d | featureApplicability |
-1.0 | |
Dueling Hackers / int_c75d67d | featureConfidence |
1.0 | |
Person of Interest | hasFeature |
Dueling Hackers / int_c75d67d | |
Dueling Hackers / int_ccf875f7 | type |
Dueling Hackers | |
Dueling Hackers / int_ccf875f7 | comment |
Criminal Minds: This is the set-up for a sort of online Meet Cute between Penelope Garcia and her soon-to-be-boyfriend, Kevin Lynch, with Garcia as the hacker. It also happens once when Garcia lost and is out of commission all day while she rips apart her computer (physically) to get it running again. |
|
Dueling Hackers / int_ccf875f7 | featureApplicability |
1.0 | |
Dueling Hackers / int_ccf875f7 | featureConfidence |
1.0 | |
Criminal Minds | hasFeature |
Dueling Hackers / int_ccf875f7 | |
Dueling Hackers / int_d07b9a7b | type |
Dueling Hackers | |
Dueling Hackers / int_d07b9a7b | comment |
In Bloody Monday the protagonist has many duels with opposing hackers, both in the first and second seasons. | |
Dueling Hackers / int_d07b9a7b | featureApplicability |
1.0 | |
Dueling Hackers / int_d07b9a7b | featureConfidence |
1.0 | |
Bloody Monday (Manga) | hasFeature |
Dueling Hackers / int_d07b9a7b | |
Dueling Hackers / int_d8bda674 | type |
Dueling Hackers | |
Dueling Hackers / int_d8bda674 | comment |
It's not really made that much of, but this happens between Yatouji Satsuki and Imonoyama Nokoru in X/1999. She is trying to hack into the computers of CLAMP Campus and he is trying to keep her out. Given that Satsuki is a technopath working in tandem with a supercomputer, the fact that Nokoru actually manages to make it combat instead of a Curb-Stomp Battle is pretty impressive. | |
Dueling Hackers / int_d8bda674 | featureApplicability |
1.0 | |
Dueling Hackers / int_d8bda674 | featureConfidence |
1.0 | |
X/1999 (Manga) | hasFeature |
Dueling Hackers / int_d8bda674 | |
Dueling Hackers / int_e31a4abd | type |
Dueling Hackers | |
Dueling Hackers / int_e31a4abd | comment |
A sequence in Megatokyo featured this. | |
Dueling Hackers / int_e31a4abd | featureApplicability |
1.0 | |
Dueling Hackers / int_e31a4abd | featureConfidence |
1.0 | |
MegaTokyo (Webcomic) | hasFeature |
Dueling Hackers / int_e31a4abd | |
Dueling Hackers / int_e4b94ee8 | type |
Dueling Hackers | |
Dueling Hackers / int_e4b94ee8 | comment |
As Uplink is all about hacking, this is inevitable; lingering around the backdoor of a computer network brings you closer to the target system carrying out a back-trace, and there's also the risk of the system administrator coming online to deal with you. | |
Dueling Hackers / int_e4b94ee8 | featureApplicability |
1.0 | |
Dueling Hackers / int_e4b94ee8 | featureConfidence |
1.0 | |
Uplink / Videogame | hasFeature |
Dueling Hackers / int_e4b94ee8 | |
Dueling Hackers / int_e67a7d6c | type |
Dueling Hackers | |
Dueling Hackers / int_e67a7d6c | comment |
Negima! Magister Negi Magi: Chisame versus Chachamaru in the festival arc. | |
Dueling Hackers / int_e67a7d6c | featureApplicability |
1.0 | |
Dueling Hackers / int_e67a7d6c | featureConfidence |
1.0 | |
Negima! Magister Negi Magi (Manga) | hasFeature |
Dueling Hackers / int_e67a7d6c | |
Dueling Hackers / int_e6f1b188 | type |
Dueling Hackers | |
Dueling Hackers / int_e6f1b188 | comment |
Happens in several route in Mystic Messenger between Seven and Unknown. Makes sense, considering they're twin brothers. | |
Dueling Hackers / int_e6f1b188 | featureApplicability |
1.0 | |
Dueling Hackers / int_e6f1b188 | featureConfidence |
1.0 | |
Mystic Messenger (Visual Novel) | hasFeature |
Dueling Hackers / int_e6f1b188 | |
Dueling Hackers / int_f1853fcd | type |
Dueling Hackers | |
Dueling Hackers / int_f1853fcd | comment |
Happens in Cannon God Exaxxion as both sides run a propaganda war against each other. | |
Dueling Hackers / int_f1853fcd | featureApplicability |
1.0 | |
Dueling Hackers / int_f1853fcd | featureConfidence |
1.0 | |
Cannon God Exaxxion (Manga) | hasFeature |
Dueling Hackers / int_f1853fcd | |
Dueling Hackers / int_fb6d726d | type |
Dueling Hackers | |
Dueling Hackers / int_fb6d726d | comment |
Special mention goes to Infinity, where hackers can and will end up in duels where the loser's head explodes. | |
Dueling Hackers / int_fb6d726d | featureApplicability |
1.0 | |
Dueling Hackers / int_fb6d726d | featureConfidence |
1.0 | |
Infinity (Tabletop Game) | hasFeature |
Dueling Hackers / int_fb6d726d | |
Dueling Hackers / int_fd0a472b | type |
Dueling Hackers | |
Dueling Hackers / int_fd0a472b | comment |
A Fox Tail quickly switches from Vulpie controlling everything with an internet connection to Vulpie struggling for control against his own robotic duplicate Evil Vulpie. | |
Dueling Hackers / int_fd0a472b | featureApplicability |
1.0 | |
Dueling Hackers / int_fd0a472b | featureConfidence |
1.0 | |
A Fox Tail | hasFeature |
Dueling Hackers / int_fd0a472b |
The following is a list of statements referring to the current page from other pages.
Copyright of DBTropes.org wrapper 2009-2013 DFKI Knowledge Management. Imprint. - Thanks to Bakken&Baeck for hosting. Contact.
Copyright of data TVTropes.org contributors under Creative Commons Attribution-Share Alike 3.0 Unported License.
Copyright of data TVTropes.org contributors under Creative Commons Attribution-Share Alike 3.0 Unported License.