Is there an issue? Send a MessageReason:
None
Added DiffLines:
* The [[https://www.youtube.com/watch?v=I-jdSgjtUPk MEMZ trojan]] may not involve skull imagery, but it causes various other overlays and payloads to appear, doing things that include, but are not limited to: moving the mouse on its own, opening satirical Google searches of "how 2 remove a virus", playing random error sounds, gradually flooding the screen with icons, causing a screen tunneling effect, and true to it being named after Internet Memes, overwriting the boot sector with an animation of Nyan Cat complete with sound.
Is there an issue? Send a MessageReason:
It being repeated "in the sequel" doesn't validate misindentation
Changed line(s) 75,76 (click to see context) from:
* As they browse the Deep Web, the protagonist of ''Videogame/WelcomeToTheGame'' is constantly hacked. Each hacking minigame starts with a cackling skull.
** This is repeated in the sequel ''VideoGame/WelcomeToTheGameII'', where anytime your computer gets hacked as you explore the Deep Web, an image of a laughing skull takes over your screen, followed by a minigame to repel the hacker.
** This is repeated in the sequel ''VideoGame/WelcomeToTheGameII'', where anytime your computer gets hacked as you explore the Deep Web, an image of a laughing skull takes over your screen, followed by a minigame to repel the hacker.
to:
* As they browse the Deep Web, the protagonist of ''Videogame/WelcomeToTheGame'' is constantly hacked. Each hacking minigame starts with a cackling skull.
**skull. This is repeated in the sequel ''VideoGame/WelcomeToTheGameII'', where anytime your computer gets hacked as you explore the Deep Web, an image of a laughing skull takes over your screen, followed by a minigame to repel the hacker.
**
Is there an issue? Send a MessageReason:
None
Changed line(s) 63 (click to see context) from:
[[folder: Literature]]
to:
Is there an issue? Send a MessageReason:
None
Changed line(s) 25,26 (click to see context) from:
Often overlaps with HollywoodHacking. Compare CallingCard for the non-computerized version of leaving a stylistic signature.
to:
Often overlaps with HollywoodHacking. Compare CallingCard for the non-computerized version of leaving a stylistic signature.
signature. Subtrope of JollyRoger.
Is there an issue? Send a MessageReason:
None
Changed line(s) 13,14 (click to see context) from:
-->-- '''Dexter Grif''', ''Machinima/RedVsBlue''
to:
-->-- '''Dexter Grif''', ''Machinima/RedVsBlue''
''WebAnimation/RedVsBlue''
Changed line(s) 81 (click to see context) from:
* Invoked in ''[[Machinima/RedVsBlueTheRecollection Red vs. Blue: Reconstruction]]''. As Simmons tries to hack Command's computer system, Grif unhelpfully offers advice such as, "You should try uploading a virus to the mainframe. I find viruses that feature a laughing skull work the best."
to:
* Invoked in ''[[Machinima/RedVsBlueTheRecollection ''[[WebAnimation/RedVsBlueTheRecollection Red vs. Blue: Reconstruction]]''. As Simmons tries to hack Command's computer system, Grif unhelpfully offers advice such as, "You should try uploading a virus to the mainframe. I find viruses that feature a laughing skull work the best."