HaloArray.png

Viral data scavengers: Difference between revisions

From Halopedia, the Halo wiki

mNo edit summary
Line 1: Line 1:
{{Era|FOR|TCP|SPB}}
{{Era|HCW}}
{{ratings}}
 


'''Viral Data Scavengers''' are a series of programs available for download at [[UNSCTTP://EPWW:COLEPROTOCOL/Virtualscav/fbr.091]], to be used in accordance with [[United Nations Space Command Emergency Priority Order 098831A-1|the Cole Protocol]].<ref>'''[[Halo: The Fall of Reach]]''', ''page 135''</ref><ref>'''[[Halo: The Cole Protocol]]''', ''page 33''</ref> It is unknown what these programs are capable of, although it can be assumed that after a commander has deleted the entirety of the Navigational database, as well as all on-board computer systems, the scavengers would sweep through, deleting everything left behind by the deletion software and destroying themselves afterward, in order to complete the protocol.
'''Viral Data Scavengers''' are a series of programs available for download at [[UNSCTTP://EPWW:COLEPROTOCOL/Virtualscav/fbr.091]], to be used in accordance with [[United Nations Space Command Emergency Priority Order 098831A-1|the Cole Protocol]].<ref>'''[[Halo: The Fall of Reach]]''', ''page 135''</ref><ref>'''[[Halo: The Cole Protocol]]''', ''page 33''</ref> It is unknown what these programs are capable of, although it can be assumed that after a commander has deleted the entirety of the Navigational database, as well as all on-board computer systems, the scavengers would sweep through, deleting everything left behind by the deletion software and destroying themselves afterward, in order to complete the protocol.
==List of appearances==
*''[[Halo: The Fall of Reach]]'' {{1st}}
*''[[Halo: The Cole Protocol]]''
*''[[Halo: Blood Line]]''


==Sources==
==Sources==
<references/>
<references/>
[[Category:UNSC Protocols]]
[[Category:UNSC Protocols]]

Revision as of 11:05, July 18, 2011


Viral Data Scavengers are a series of programs available for download at UNSCTTP://EPWW:COLEPROTOCOL/Virtualscav/fbr.091, to be used in accordance with the Cole Protocol.[1][2] It is unknown what these programs are capable of, although it can be assumed that after a commander has deleted the entirety of the Navigational database, as well as all on-board computer systems, the scavengers would sweep through, deleting everything left behind by the deletion software and destroying themselves afterward, in order to complete the protocol.

List of appearances

Sources