intro 0
{
	name Splitter
	desc This high-priority program travels against the traffic flow, often resulting in data packet collisions.
	object splitter 0
}

intro 1
{
	name Pusher
	desc This program guides data packets by pushing against them. Prolonged contact with it results in data loss.
	object pusher 0
}

intro 2
{
	name Stinger
	desc This sophisticated filtering algorithm is programmed to stop any unauthorized data packets.
	object scorpion 0
}

intro 3
{
	name Ripsaw
	desc A serious bandwidth hog, this program reserves a whole data lane for itself and often harms other traffic.
	object ripsaw 0
}

intro 4
{
	name LASERHED
	desc The details of this firewall program are classified but its efficiency in stopping unwanted traffic is well known.
	object pickup 1
}

intro 5
{
	name Creeper
	desc This autonomous software agent examines network traffic for novel new program code it can steal.	
	object gridbug 0
}

intro 6
{
	name Skiball
	desc This nasty malware appears to be specifically designed to prevent you from snooping around.
	object skiball 0
}

intro 7
{
	name Bomber
	desc Existing outside the data stream, this program interacts with it by spawning destructive data packets.	
	object dragonfly 0
}

intro 8
{
	name Scanner
	desc This traffic scanning program doesn't appear to care if it causes heavy packet loss. Be careful.
	object mine 6
}

intro 9
{
	name Terabug
	desc Little is known about this mutant data-miner, except for its ruthlessness in acquiring information.
	object pickup 1
}

intro 10
{
	name Masher
	desc These outgoing packets of data must be of high importance, judging by the heavy encryption armor.	
	object splitter 1
}

intro 11
{
	name Flapjack
	desc This program has one purpose - to prevent unauthorized use of these data lanes by throwing you out.
	object scorpion 2
}

intro 12
{
	name Plopper
	desc This security program tries to slow you down by clogging the data lanes with conflicting packets.
	object tank 1
}

intro 13
{
	name Tank
	desc This highly advanced network security program seeks and destroys unauthorized data traffic.
	object tank 0
}

intro 14
{
	name Sentinel
	desc This static packet identification and rejection algorithm is used to guard data of high importance.
	object sideturret 0
}
