Roguelike video games | Video games using procedural generation
Crypt of the NecroDancer is a roguelike rhythm video game developed and published by Canadian independent game studio Brace Yourself Games. The game takes fundamental elements of a roguelike dungeon exploration game and adds a beat-matching rhythm game set to an original soundtrack written by Danny Baranowsky. The player's actions are most effective when moving the character set to the beat of the current song and are impaired when they miss a beat, so it is necessary to learn the rhythmic patterns that the various creatures follow. The mixed-genre game includes the ability to import custom music, and the option to use a dance pad instead of traditional controllers or the keyboard. The game was released for Microsoft Windows, OS X, and Linux in April 2015, being co-published by Klei Entertainment, for the PlayStation 4 and Vita in February 2016, for the Xbox One in February 2017, and for Nintendo Switch in February 2018. Crypt of the NecroDancer Pocket Edition, developed for iOS, was released in June 2016. A crossover title, Cadence of Hyrule, featuring music and elements from The Legend of Zelda, was released in June 2019 for the Nintendo Switch. A followup game, Rift of the NecroDancer, was announced in August 2022. (Wikipedia).
Primality (1 of 2: Fermat's Test)
From playlist Cryptography
Cryptanalysis of Classical Ciphers
Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in
From playlist Computer - Cryptography and Network Security
Solving The MYSTERY BOX Cryptex Puzzle!!
Today I decided to try my luck and open up the Mystery Box Cryptex Puzzle by Bad Robot and Theory 11. This beautiful box contains a mystery within a mystery! Would you open it or leave it locked forever?! Also.. Secret section at the end...Enjoy! Mystery Box: https://store.theory11.com/pr
From playlist Puzzles!
Few other Cryptanalytic Techniques
Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in
From playlist Computer - Cryptography and Network Security
Steganography Tutorial - Hide Messages In Images
Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography takes cryptography a step further by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it
From playlist Ethical Hacking & Penetration Testing - Complete Course
Introduction - Applied Cryptography
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
From playlist Applied Cryptography
Other Public Key Cryptosystems: Part 1
Fundamental concepts of Diffie-Hellman Key exchange are discussed. ElGamal Cryptosystem is presented. Elliptic curves are Analyzed.
From playlist Network Security
How To Find Long Lost Treasure Under An Ancient Church | Secrets of the Underground
Secrets of the Underground | Saturdays at 10p Rob and Stefan create a 3D map of the Nea Church in Jerusalem's sub-basement in search of King Herod's long-lost temple treasures. Full Episodes Streaming FREE: https://www.sciencechannel.com/tv-shows/secrets-of-the-underground/ Subscribe to S
From playlist Secrets of the Underground
Totient Function - Applied Cryptography
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
From playlist Applied Cryptography
GoRuCo 2013 - Krypt. Semper Pi. by Martin Bosslet
Many people don't like Cryptography. Whenever he falls out of a bar, he carries this strong odor of ivory-towering, bikeshedding and plain, outright arrogance. He seems to be a loner and a smartass, rude, and it's hard to follow his boring, lengthy explanations. But once you get to know hi
From playlist GoRuCo 2013
24. Stem Cells, Apoptosis, & Tissue Homeostasis
MIT 7.016 Introductory Biology, Fall 2018 Instructor: Adam Martin View the complete course: https://ocw.mit.edu/7-016F18 YouTube Playlist: https://www.youtube.com/playlist?list=PLUl4u3cNGP63LmSVIVzy584-ZbjbJ-Y63 Professor Martin talks about the regenerative and renewal capabilities of cel
From playlist MIT 7.016 Introductory Biology, Fall 2018
Stream archive: Creating a backend with Axum for a todo app (2022-09-23)
Broadcasted live on Twitch -- Watch live at https://www.twitch.tv/brookzerker
From playlist Uncut Live Streams
The Rise and Fall of Compton California - IT'S HISTORY
Compton is a city in southern California, with a rich history of both tragedy and triumph. Come explore the Compton of the past by reading historical accounts and watching old footage, then compare it to what Compton looks like today. We'll cover everything from gang violence to the histo
From playlist California History
Ruby Conf 12 - Krypt the next level of Ruby Cryptogaphy by Martin Boßlet
Last year it was an idea, more of it in our heads than on github. This year, krypt is reality, it's growing quickly and its goal is to become the successor of the OpenSSL extension. Learn about why we need a successor at all, about the evils of OpenSSL certificate validation and how krypt
From playlist Ruby Conference 2012
Rocky Mountain Ruby 2014 - 80,00 Plaintext Passwords
fluffmuffin, peppercorn, gilligan — those are just a few of our users' plaintext passwords. I have 80,000 more, and it only took me 87 seconds to gather them from our customer database in a white-hat attack. In Act I, we'll cover the history of secure password storage, examine the hack,
From playlist Rocky Mountain Ruby 2014
TUT1062 SAP HANA Replication and SUSE HA Security Best Practice
This tutorial session was delivered at SUSECON in April 2019, in Nashville, TN. Abstract: Demo on how to run HANA 2.0 using SUSE HA Extension. HANA 2.0 will be demonstrated on how to manage multi tenant databases using HANA Cockpit 2.0. The technical demo includes a setup of SAP HANA Rep
From playlist SUSECON 2019
Cryptid The Swamp Beast: Bad Magic | History
Deputy Lambert and Jules visit a voodoo practitioner to uncover information about a strange object found near the dead body of a local man. Subscribe for more Cryptid: The Swamp Beast: http://histv.co/SubscribeHistoryYT Check out exclusive Cryptid: The Swamp Beast videos and full episode
From playlist Cryptid: The Swamp Beast | History
Frédéric de Portzamparc - Faiblesse structurelle des schémas McEliece avec clefs compactes
Faiblesse structurelle des schémas McEliece avec clefs compactes
From playlist Journées Codage et Cryptographie 2014