Roguelike video games | Video games using procedural generation

Crypt of the NecroDancer

Crypt of the NecroDancer is a roguelike rhythm video game developed and published by Canadian independent game studio Brace Yourself Games. The game takes fundamental elements of a roguelike dungeon exploration game and adds a beat-matching rhythm game set to an original soundtrack written by Danny Baranowsky. The player's actions are most effective when moving the character set to the beat of the current song and are impaired when they miss a beat, so it is necessary to learn the rhythmic patterns that the various creatures follow. The mixed-genre game includes the ability to import custom music, and the option to use a dance pad instead of traditional controllers or the keyboard. The game was released for Microsoft Windows, OS X, and Linux in April 2015, being co-published by Klei Entertainment, for the PlayStation 4 and Vita in February 2016, for the Xbox One in February 2017, and for Nintendo Switch in February 2018. Crypt of the NecroDancer Pocket Edition, developed for iOS, was released in June 2016. A crossover title, Cadence of Hyrule, featuring music and elements from The Legend of Zelda, was released in June 2019 for the Nintendo Switch. A followup game, Rift of the NecroDancer, was announced in August 2022. (Wikipedia).

Crypt of the NecroDancer
Video thumbnail

Cryptanalysis of Classical Ciphers

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Solving The MYSTERY BOX Cryptex Puzzle!!

Today I decided to try my luck and open up the Mystery Box Cryptex Puzzle by Bad Robot and Theory 11. This beautiful box contains a mystery within a mystery! Would you open it or leave it locked forever?! Also.. Secret section at the end...Enjoy! Mystery Box: https://store.theory11.com/pr

From playlist Puzzles!

Video thumbnail

Few other Cryptanalytic Techniques

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Steganography Tutorial - Hide Messages In Images

Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography takes cryptography a step further by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

Introduction - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Other Public Key Cryptosystems: Part 1

Fundamental concepts of Diffie-Hellman Key exchange are discussed. ElGamal Cryptosystem is presented. Elliptic curves are Analyzed.

From playlist Network Security

Video thumbnail

How To Find Long Lost Treasure Under An Ancient Church | Secrets of the Underground

Secrets of the Underground | Saturdays at 10p Rob and Stefan create a 3D map of the Nea Church in Jerusalem's sub-basement in search of King Herod's long-lost temple treasures. Full Episodes Streaming FREE: https://www.sciencechannel.com/tv-shows/secrets-of-the-underground/ Subscribe to S

From playlist Secrets of the Underground

Video thumbnail

Totient Function - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

GoRuCo 2013 - Krypt. Semper Pi. by Martin Bosslet

Many people don't like Cryptography. Whenever he falls out of a bar, he carries this strong odor of ivory-towering, bikeshedding and plain, outright arrogance. He seems to be a loner and a smartass, rude, and it's hard to follow his boring, lengthy explanations. But once you get to know hi

From playlist GoRuCo 2013

Video thumbnail

24. Stem Cells, Apoptosis, & Tissue Homeostasis

MIT 7.016 Introductory Biology, Fall 2018 Instructor: Adam Martin View the complete course: https://ocw.mit.edu/7-016F18 YouTube Playlist: https://www.youtube.com/playlist?list=PLUl4u3cNGP63LmSVIVzy584-ZbjbJ-Y63 Professor Martin talks about the regenerative and renewal capabilities of cel

From playlist MIT 7.016 Introductory Biology, Fall 2018

Video thumbnail

Stream archive: Creating a backend with Axum for a todo app (2022-09-23)

Broadcasted live on Twitch -- Watch live at https://www.twitch.tv/brookzerker

From playlist Uncut Live Streams

Video thumbnail

The Rise and Fall of Compton California - IT'S HISTORY

Compton is a city in southern California, with a rich history of both tragedy and triumph. Come explore the Compton of the past by reading historical accounts and watching old footage, then compare it to what Compton looks like today. We'll cover everything from gang violence to the histo

From playlist California History

Video thumbnail

Ruby Conf 12 - Krypt the next level of Ruby Cryptogaphy by Martin Boßlet

Last year it was an idea, more of it in our heads than on github. This year, krypt is reality, it's growing quickly and its goal is to become the successor of the OpenSSL extension. Learn about why we need a successor at all, about the evils of OpenSSL certificate validation and how krypt

From playlist Ruby Conference 2012

Video thumbnail

Rocky Mountain Ruby 2014 - 80,00 Plaintext Passwords

fluffmuffin, peppercorn, gilligan — those are just a few of our users' plaintext passwords. I have 80,000 more, and it only took me 87 seconds to gather them from our customer database in a white-hat attack. In Act I, we'll cover the history of secure password storage, examine the hack,

From playlist Rocky Mountain Ruby 2014

Video thumbnail

TUT1062 SAP HANA Replication and SUSE HA Security Best Practice

This tutorial session was delivered at SUSECON in April 2019, in Nashville, TN. Abstract: Demo on how to run HANA 2.0 using SUSE HA Extension. HANA 2.0 will be demonstrated on how to manage multi tenant databases using HANA Cockpit 2.0. The technical demo includes a setup of SAP HANA Rep

From playlist SUSECON 2019

Video thumbnail

Cryptid The Swamp Beast: Bad Magic | History

Deputy Lambert and Jules visit a voodoo practitioner to uncover information about a strange object found near the dead body of a local man. Subscribe for more Cryptid: The Swamp Beast: http://histv.co/SubscribeHistoryYT Check out exclusive Cryptid: The Swamp Beast videos and full episode

From playlist Cryptid: The Swamp Beast | History

Related pages

Spike Chunsoft | Roguelike | Spelunky | Cadence of Hyrule | NetHack | FTL: Faster Than Light