Display title | Borrowed Biometric Bypass |
Default sort key | Borrowed Biometric Bypass |
Page length (in bytes) | 24,563 |
Namespace ID | 0 |
Page ID | 16972 |
Page content language | en - English |
Page content model | wikitext |
Indexing by robots | Allowed |
Number of redirects to this page | 0 |
Counted as a content page | Yes |
Number of subpages of this page | 1 (0 redirects; 1 non-redirect) |
Page image | |
Edit | Allow all users (infinite) |
Move | Allow all users (infinite) |
Delete | Allow all users (infinite) |
Page creator | prefix>Import Bot |
Date of page creation | 21:27, 1 November 2013 |
Latest editor | Looney Toons (talk | contribs) |
Date of latest edit | 14:51, 17 June 2020 |
Total number of edits | 14 |
Recent number of edits (within past 180 days) | 0 |
Recent number of distinct authors | 0 |
Transcluded templates (7) | Templates used on this page:
|
Description | Content |
Article description: (description ) This attribute controls the content of the description and og:description elements. | Once upon a time, infiltrating a base was pretty easy: just knock the guards out, take the keys, and get in. Fortunately, modern high-tech facilities, or in The Future have more cunning devices, and can identify the guards by unique biological features, such as handprints or retinal scans. These cunning devices are reliable, efficient, and not prone to believing just anyone who happens to be wearing the right uniform. Great, huh? |