About: Counter-Illegal Entry Protocols   Sponge Permalink

An Entity of Type : owl:Thing, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

Since 2521, the military operating systems had been standardized for over 70 years, leaving them vulnerable to hacking. There were several incidents, the most prominent being with the destroyer UNSC Persephone, in which the systems were hacked. This prompted Dr. Halsey to create new protocols. The algorithms were based on already existing translation algorithms.

AttributesValues
rdfs:label
  • Counter-Illegal Entry Protocols
rdfs:comment
  • Since 2521, the military operating systems had been standardized for over 70 years, leaving them vulnerable to hacking. There were several incidents, the most prominent being with the destroyer UNSC Persephone, in which the systems were hacked. This prompted Dr. Halsey to create new protocols. The algorithms were based on already existing translation algorithms.
dcterms:subject
dbkwik:halo/proper...iPageUsesTemplate
abstract
  • Since 2521, the military operating systems had been standardized for over 70 years, leaving them vulnerable to hacking. There were several incidents, the most prominent being with the destroyer UNSC Persephone, in which the systems were hacked. This prompted Dr. Halsey to create new protocols. The algorithms were based on already existing translation algorithms.
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software