Follow TV Tropes

Following

History Literature / TrueNames

Go To

OR

Is there an issue? Send a MessageReason:
None


* ObfuscatedInterface: the Portals used to access The Other Plane use low-bandwidth communications (to help avoid detection). The interface uses EEG, and simply learning to see The Other Plane properly, let alone manipulate it, requires training and practice.

to:

* ObfuscatedInterface: the The Portals used to access The Other Plane use low-bandwidth communications (to help avoid detection). The interface uses EEG, and simply learning to see The Other Plane properly, let alone manipulate it, requires training and practice.
Is there an issue? Send a MessageReason:
Proper format


-->''"...once an enemy, even a weak unskilled enemy, [[IKnowYourTrueName learned the sorcerer's true name]], then routine and widely known spells could destroy or enslave even the most powerful."''

"True Names" is an influential 1981 ScienceFiction {{Novella}} by Creator/VernorVinge about computer hackers who regularly meet in an open-ended on-line game called "The Other Plane". The hackers must keep their True Names--their "real world" identities--hidden, like wizards of lore, both to avoid detection by law enforcement ("the Great Enemy"), and to protect themselves from being hacked or blackmailed by others in the game.

to:

-->''"...->''"...once an enemy, even a weak unskilled enemy, [[IKnowYourTrueName learned the sorcerer's true name]], then routine and widely known spells could destroy or enslave even the most powerful."''

"True Names" ''True Names'' is an influential 1981 ScienceFiction {{Novella}} by Creator/VernorVinge about computer hackers who regularly meet in an open-ended on-line game called "The Other Plane". The hackers must keep their True Names--their "real world" identities--hidden, like wizards of lore, both to avoid detection by law enforcement ("the Great Enemy"), and to protect themselves from being hacked or blackmailed by others in the game.

Added: 569

Removed: 558

Is there an issue? Send a MessageReason:
None


* DeityOfHumanOrigin: When Mr. Slippery and Erythrina forcibly multiplex their consciousness, it gives them the power to take over more machines almost without thinking. Repeat until they (and the BigBad) have total control over and knowledge of anything connected to any computer ever. The BigBad detonates several nukes in their silos ''to make a point in discussion'', and it's not a big deal to any of them. At one point, Mr. Slippery is frustrating and rerouting the soldiers sent to kill his real body as a side process while concentrating on something different.



* AGodAmI: When Mr. Slippery and Erythrina forcibly multiplex their consciousness, it gives them the power to take over more machines almost without thinking. Repeat until they (and the BigBad) have total control over and knowledge of anything connected to any computer ever. The BigBad detonates several nukes in their silos ''to make a point in discussion'', and it's not a big deal to any of them. At one point, Mr. Slippery is frustrating and rerouting the soldiers sent to kill his real body as a side process while concentrating on something different.

Added: 80

Changed: 4

Is there an issue? Send a MessageReason:
Added image.


[[quoteright:350:https://static.tvtropes.org/pmwiki/pub/images/true_names.png]]



----

to:

----
Is there an issue? Send a MessageReason:
None

Added DiffLines:

* HackerCollective: The Mailman initially seems to be trying to recruit other members of the Coven into a collective so they can tackle hacks they wouldn't dare try on their own.

Top