Comex - you've nailed the current theory as to why my threads vanished.
Cassius - it is a bummer but I'm just glad to be here with my posts intact. Maybe Erynn will give me a 'complete' ranking like the VAs (fingers crossed).
VChat - a nice summary but I do have a suggested edit - see below.
---------------------------------------
EPISODE 30: A GREAT DAY
In this episode, XANA attempts to follow an alterior motive consisting of constantly using the RTTP program to further increase his power. according to Jeremie, the data that was earlier recovered from Sector 5 was booby-trapped with a 'root-kit' which infected the console and connected to an active tower gave XANA access to the STM and the RTTP.
But as soon as the team gets a grasp of what's going on, XANA changes tactics from his usual "attack the group and steal Aelita's memory". With the increased power from the numerous RTTP's, XANA is able to teach his routers a new trick, human posession, and his first victim is Sissi.
Current theory suggests that the routers invade the human body and while the majority use their SAP connection to the computer's Power Drive to augment physical abilities the remainder attack the brain, altering the physce to suit their needs.
While the group attempts to deactivate the tower on Lyoko for the second time, XANA once again activates another RTTP. but this time around Jeremie manages to lock out the RTTP program from XANA before the day starts over.[/quote]
--------------
Hope this didn't sound like too much of a lecture, especially after yesterday's events, and you can ignore it if you like.

I have one suggested edit for UNCHARTED TERRITORY that it's the first time we've seen a automated scanner sequence with a countdown.
--------------
EPISODE THIRTY-ONE: MISTER PUCK
A series of visions by Aelita lead the team to the discovery of Franz Hopper's CD diary. Not only does this confirm Hopper's connection to Lyoko but it also suggests either implanted messages in Aelita's memory or the voice of her subconcious leading the kids to the diary.
The most noteable event of this episode is XANA's failed posession attempt of Odd and Ulrich and his sucess with Jeremie.
Current theory suggests that since the kids have all been dismantled and reconstructed multiple times in the scanner by ZPE 'Space-Construct' methods, they are immune to direct router posession - given that they thus have the same ZPE energy signiture as the routers.
Jeremie on the other hand has only been in the scanners twice to date, and thus has less resistance - however the routers are clearly finding him harder to control, and so it would seem XANA instead of maniuplating his physce dominates in completely and takes full control - this will happen again in 'Tip-Top-Shape,' and 'Contact.'
This is also the first time a Posessee is shown to have electricity-based powers.
This episode also confirms that Rematerialisation is not instantaeneous - when XANA-Jeremie launched Ulrich's ReMatt program a progress bar appeared that had to be full before Ulrich could be yanked out.
-----------------
EPISODE THIRTY-TWO: SAINT VALENTINE'S DAY
XANA, seemingly having learned from his failure to posess Ulrich and Odd, uses a less direct method to posess Aelita.
A young man under XANA control is seen to leave a present outside Aelita's room. The present, a necklace, actually contains a computer chip which does the partial job of the routers - possibly via a SAP link recieving electricity and commands from XANA and transmitting them to Aelita through the necklace's contact to her body.
The net result is that Aelita is posessed in mind but without the routers to augment her does not gain supernatural strength or lightening powers.
This is the third time XANA has used the scanners to materialise objects after 'Image Problem' and 'False Start.' However rather than infect a scanner he seems to have used the posessed teen from the start to operate the console and virtually construct the necklace there.
This is also the first time a posessee is shown to have a 'Static-Cling' effect to walls and ceilings, and the only time where one used a 'hypnosis' effect to lull a threat - in this case Jim.
--------------------
EPISODE THIRTY-THREE: FINAL MIX
XANA uses his spectre to posess Jim, who shows another set of firsts for a posessee - the ability to create a temporary clone via 'Space-Construction' (temporary due to the limited capabilities of the routers) and the ability to phase through objects.
This episode also further refutes the idea of most posessees being concious and 'in-control' of themselves - Jim seems positively euphoric when he operates the computer.
---------------------
EPISODE THIRTY-FOUR: MISSING LINK
XANA changes tactics but still with the strategy of draining Aelita's memory; the Skyphazoa attacks Yumi and removes her codec for translating vDNA to human DNA, trapping her on Lyoko.
Aelita in another show of self-sacrificing courage offers to trade her codec for Yumi's, unaware that 'opening up' her folder to transfer the data will allow XANA direct acess to her code and thus her memories.
This episode also confirms Carthage has being the location of all of XANA's data, as Yumi's codec has been relocated to the Carthage memory banks.
--------------------
Remember guys - shoot me down in flames.

And as an aside, Halospree mentioned in 'Forum Messing Up?' that he'd gotten a view of part of the RTTP code in 'The Girl of the Dreams.' Here's what he typed out;
Jeremie's Monitor wrote:function RTTP(%exclude) {
$time = global xana.getAttackTime;
quantium("time", $time, global $logfile);
echo "RETURN TO THE PAST NOW!!";
}
RTTP(global virtualized.getNames);
I've highlighted some interesting bits. As well as RTTP being apparently cannon - we can see the key words EXCLUDE and GLOBAL, backing up the theory that only humans who are 'tagged' have their conciouses returned, and the others are excluded. The aquisition of memory data from people virtualised in Lyoko is also backed up in the bottom line - 'Virtualised. Get Names.'
The use of the word 'Logfile' also seems to support the concept of a tower recording all attack data, as does 'Get Attack Time.'
All of this is of course conjecture depending on your personal viewpoint and how much you read into it, but I find it very heartening - we would appear to be on the right track.
--------------
Who wants to go next, cos we've got a lot to do before 6.00pm tomorrow.