Roguelike video games

Inscryption

Inscryption is a roguelike deck-building game developed by Daniel Mullins Games and published by Devolver Digital. Inscryption was released for Microsoft Windows on October 19, 2021. It was released on Linux and macOS on June 22, 2022, which was followed by PlayStation 4 and 5 versions in August. A Nintendo Switch port was released in December 2022. As a metafictional game, Inscryption involves found footage as the player watches the experiences of a vlogger that stumbled across a video game called Inscryption, which holds a number of strange secrets. As the player interacts with a mysterious dealer in a dark cabin, they find further secrets that expose more of the history of the fictional Inscryption. The game was initially a prototype that Daniel Mullins had created for a Ludum Dare game jam with the theme of "Sacrifices must be made". Initially, Mullins created a card game where sacrificing cards already played became the central mechanic. After publishing the prototype to itch.io and receiving positive response, Mullins expanded the game, expanding on both the card game and adding escape the room-style elements. An official mod was released in March 2022 that allowed players to play a version of the game that focused only on the card game without the additional puzzle elements. The game received generally positive reviews, and was named both Game of the Year for the Game Developers Choice Awards and the Seumas McNally Grand Prize at the Independent Games Festival, and was nominated as game of the year for the D.I.C.E. Awards, and the BAFTA Game Awards. (Wikipedia).

Inscryption
Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Steganography Tutorial - Hide Messages In Images

Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography takes cryptography a step further by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

the Internet (part 2)

An intro to the core protocols of the Internet, including IPv4, TCP, UDP, and HTTP. Part of a larger series teaching programming. See codeschool.org

From playlist The Internet

Video thumbnail

How does wiretapping work?

It’s surprisingly easy to listen to private conversations if you know how to hack satellites, bug devices or tap a phone line. Learn more at HowStuffWorks.com: http://people.howstuffworks.com/wiretapping.htm Share on Facebook: Share on Twitter: Subscribe: http://goo.gl/ZYI7Gt Visit our

From playlist Stuff About Technology

Video thumbnail

Privacy Matters

http://privacymatters.nl/

From playlist awareness

Video thumbnail

Intrusion Detection: Part 2

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

Intrusion Detection: Part 1

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

Symmetric Cryptosystems - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Summary - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Related pages

The Binding of Isaac (video game) | Escape room