Background: Didn't Go to College, Does Some Basic Database Stuff

Total Page:16

File Type:pdf, Size:1020Kb

Background: Didn't Go to College, Does Some Basic Database Stuff Background: Didn’t go to college, does some basic database stuff (seems like MS Access: mentioned macros + database management) I: My first question is: what comes to mind when I say the word “encryption”? The first word you said? I: Oh, no, just what kinds of things come to mind. Um, secretive. That is tricky. When I think of encryption, I just immediately think that it’s keeping information from any user except the end user. I: So do you have any experience using encryption? Not too much. There’s been a slight use of encryption, mostly just like base-64 to send full private messages to somebody else that I don’t want anybody else to see or stumble upon a chat log and be like, “Hey, what’s this?” Mostly just to send a specific message to one target. I: If you had to define encryption or explain what it is or how it works, what would you say? To explain encryption, I would say that it would use an algorithm that would multiply out your original message. And on the other side, it would have the exact problem to figure in to decrypt your message. So one side would multiply the letter A by 64 and the other side would divide it by 64 to decrypt it. I: So when you think about encryption or hear that word, what kind of imagery comes to mind? With encryption, more just alphanumeric. Just letters and numbers in what appears to be a random string. Maybe email. I: Why would you say email? Why did that come up? Email mostly because email uses HTTPS like in, say, Outlook. From what I understand, Hotmail encrypts my email under the HTTPS, so if there was any software on my computer that would be scraping anything off my computer, it would not scrape my email. I: That’s pretty much the questions I had on that topic. [Diagramming exercise] --Excerpt-- Just any encryption? I just basically have to build a cipher? I: Entirely up to you, whatever you imagine it looks like. I: Okay, can you explain what’s going on in that first picture? Okay, on that one, I did a simple algorithm for it. The original, the first variable, has 4 letters attached to it. So if the original letter is “T”, that’s the first variable, it’ll add four letters, so it’ll go “U”, “V”, “W”, and end on “X”. And then every letter after that, continue to add 4 to each. The cipher is “+4” basically. I: And how did you decide on that +4? It’s just kind of easy, and it wasn’t a +1 like the second stick figure guy that’s coming up. I figure +4 made it look not exactly like the original message; it was enough off that you would have to know that—well, I guess you could easily work it out on your own, but—but not easily able to determine that “XLMW” is “This”. I: Okay, yeah. So can you explain what’s going on with your stick man there? So the stick man is kind of the same concept. The original, I used variable 1. I will say this is much harder to figure out a sequence to encode it because it’s a regular everyday object, not quite like a word. So the stick figure guy, I did the same, I did a clockwise rotation +1. So where his head would be, his arm ended up, and his left arm ended up where his left leg was. I: So you kind of scrambled the stick man? Yeah, but scrambled in a configurable manner so that he can be unscrambled. I: Okay, couple questions here. First, that stick man. The end product here, where you kind of reconfigured him, do you imagine the output looks like what you have there? I can make out bits and pieces of him, but can’t quite tell what the original was? The stick figure you can probably figure out what he originally looked like *laughs* I: I guess I meant like a jigsaw puzzle. Is that kind of what’s happening here? Breaking it into pieces and scrambling it up? Yeah. I: Okay. With the message from the first part, my next question is: imagine you’re going to encrypt that same message multiple times, is the output the same each time? What do you mean? I: For example, you have that sentence that you’ve encrypted and added the four letters, etc. Now, imagine tomorrow, you’re going to encrypt that same message. Is it going through the same process? Would I choose the same process? I: Imagine that a computer is encrypting it as opposed to you doing it by hand. Do you think it comes ​ ​ out the same each time? Uh, in the example I did, yes. Because it’s a static encryption. It’s just +4. It would be static, come out the same every time. I: So it depends on that pattern that you’re using? Yeah. Now, it would change if you made it dynamic as the day. I just didn’t want to do a really complicated one for the sake of time, but it could have been +4 and then add on the day of the month. So then each day would be dynamic. Well, for 31 days. I: My next question is: imagine you’re—and you mentioned before sending a base-64 encoded message to a friend. So imagine a similar scenario, you want to send an encrypted message to your friend. So your friend gets this message and it’s gobbledygook, how does he know what to do with it? How does he get back the original message? Just in that exact example? There would already be a decoder that he would know. It would be the same, backwork the multiplying factor. I: I guess that’s my question: how does he know what he needs to do? If all you gave him was the message. If I all gave him was a mash of numbers and letters, I would assume he wouldn’t know *laughs* Without the cipher or decryption code, you would just assume that I don’t know. I: Sorry, I guess I’m asking a little vague here. My real question is how do you get him that cipher? Oh, that would be established previous to sending the message. That would be “Here is the special key for me and you, here is the backwork stuff.” It’d be like “I sent you a message, wink wink, why don’t you check your email? Everything is +4.” So you’d just minus 4 essentially. I’d tell him the cipher code way ahead of time so any message we had between us, you’d have to know that it was +4. That’s the elementary version, I guess. I: That makes sense. Now, imagine that you’re a hacker or maybe you’re the government and you’ve intercepted the message. So you have the coded version but not the cipher, you didn’t capture that part. How hard is it to recover the original message, if all you have is the coded part and not the cipher? If you just had a pen and paper, that would take years *laughs* If you had even a regular computer, that would probably still take years. But if you had like a quantum computer, that could maybe take seconds. That would depend on what you were using to decipher the message. I: Okay, so imagine the NSA has the message. Whatever you imagine their capabilities to be, how hard do you think it would be for them? Probably not hard at all. I imagine they have quantum computing, so I assume they’d be able to figure that out fairly quickly. It’s kind of like WWII with them cracking the dynamic ciphers for the cipher typewriters. I: You’re talking about Enigma? Yep. I: Okay, great. So let’s move on to the next part of the interview. We’ve been talking about what encryption is and how it works, now I want to talk about how encryption gets used. Do you think encryption plays any role in your daily life? Yes, definitely. Email. Anything with HTTPS, so pretty much most of the web, especially with Chrome. Most passwords, there’s encryption for it, like 2-step verification. LastPass, they encrypt it to where they don’t even know your password, they don’t give themselves the encryption key. I: Okay, few things there, you brought up a bunch. One, you mention LastPass and an “encryption key”. So what is an encryption key? An encryption key is kind of like a cipher, it’s the solution to what you multiplied out by. It’s either like 128 or 256 encryption. The solution for whatever the gobbledygook if somebody were to look in their files or if they were to look in the files, they’d see the gobbledygook. But they’re not storing your solution to make the gobbledygook into regular English or whatever language you’ve typed in. I: So what form do you think a key is? Is it a list of operations? A list of numbers? What is it? From what I understand about it, some of it is multiplying primes, and I guess that’s why they gave out cash awards to people who find new prime numbers for encryption. I: You mentioned HTTPS, and you also mentioned that at the beginning.
Recommended publications
  • Playstation Network Guide Parental Controls
    Parental controls guide PlayStation Network guide Parental Controls information Type of guide Gaming consoles and platforms Features and Benefits Although you must be 18 to use the PS Network, you can create a sub-account for your child that is linked to your account and have full control over the restrictions placed on this sub-account restricting how they interact on the platform. What specific content can I restrict? Browser Access Chatting In App purchasing Inappropriate content What do I need? A web browser to set up a sub-account and not a PlayStation device. You will need to set up a parent/master PlayStation Network account that we will use to create a sub-account from. PlayStation Network guide Step by step guide 1 Go to www.playstation.com if you need to create a parental/master PlayStation Network account then click on “Join Today” and follow the steps otherwise click on “Sign in to PSN”. PlayStation Network guide Step by step guide 2 Once signed in click on the link to “Account Settings” and then confirm your log in details. PlayStation Network guide Step by step guide 3 Select the “Family Management” tab and then click on “Family Management”. Click “OK” to confirm. PlayStation Network guide Step by step guide 4 You will need to confirm your account details again. Click “Continue”. PlayStation Network guide Step by step guide 5 Click on “Add Family Member” then Click on “OK”. PlayStation Network guide Step by step guide 6 Fill out the details for your child. Use their email address or your own.
    [Show full text]
  • Sony Computer Entertainment Inc. Introduces Playstation®4 (Ps4™)
    FOR IMMEDIATE RELEASE SONY COMPUTER ENTERTAINMENT INC. INTRODUCES PLAYSTATION®4 (PS4™) PS4’s Powerful System Architecture, Social Integration and Intelligent Personalization, Combined with PlayStation Network with Cloud Technology, Delivers Breakthrough Gaming Experiences and Completely New Ways to Play New York City, New York, February 20, 2013 –Sony Computer Entertainment Inc. (SCEI) today introduced PlayStation®4 (PS4™), its next generation computer entertainment system that redefines rich and immersive gameplay with powerful graphics and speed, intelligent personalization, deeply integrated social capabilities, and innovative second-screen features. Combined with PlayStation®Network with cloud technology, PS4 offers an expansive gaming ecosystem that is centered on gamers, enabling them to play when, where and how they want. PS4 will be available this holiday season. Gamer Focused, Developer Inspired PS4 was designed from the ground up to ensure that the very best games and the most immersive experiences reach PlayStation gamers. PS4 accomplishes this by enabling the greatest game developers in the world to unlock their creativity and push the boundaries of play through a system that is tuned specifically to their needs. PS4 also fluidly connects players to the larger world of experiences offered by PlayStation, across the console and mobile spaces, and PlayStation® Network (PSN). The PS4 system architecture is distinguished by its high performance and ease of development. PS4 is centered around a powerful custom chip that contains eight x86-64 cores and a state of the art graphics processor. The Graphics Processing Unit (GPU) has been enhanced in a number of ways, principally to allow for easier use of the GPU for general purpose computing (GPGPU) such as physics simulation.
    [Show full text]
  • Social Media Ruler: Facebook
    SOCIAL MEDIA RULER: FACEBOOK Presented by 50 RULERS OF ENGAGEMENT Presented by NAB Show CATEGORY COMPANY A small group of big SVOD Netflix Search Google companies dominate a Wearables Apple Box Office Disney dizzying array of products Streaming Audio Spotify Smart Speakers Amazon and services aimed at Social Media Facebook Messaging Facebook your eyes and ears. App Stores Apple Operating Systems Microsoft In the grand scheme of how a global ing with each other across a broad swath Cloud Services Amazon pandemic will reshape the future, there are of overlapping business interests, from Smartphones Samsung more profound issues to consider than the TV stations to app stores to video game PCs/Tablets Apple impact COVID-19 is having on the media consoles to smart watches. and technology businesses. But even as so These companies are the “Rulers of TV Networks Disney much is disrupting these industries, some Engagement.” Variety Intelligence Platform TV Stations Nexstar things don’t change: Their competitive and the National Association of Broad- framework remains intact. casters present a topline examination of Pay TV Comcast From 30-minute TV shows to 3-milisec- the trends and rivalries that distinguish SVOD Aggregators Amazon ond search-engine returns, a mega-war is the many different markets in the atten- being waged for mindshare across billions tion economy. In the slides that follow, we Virtual MVPDs Disney of devices worldwide. While the media examine 25 such competitive sets. Connected TV Roku business is at the epicenter of this frenzy, Take a front-row seat to the biggest Game Publishers Tencent it’s the technology giants who have esca- business battleground on the planet.
    [Show full text]
  • Playstation Network Password Reset Email Not Received
    Playstation Network Password Reset Email Not Received Juan shapes his incertitude pales editorially, but azygous Bryn never nobble so charmlessly. Unsystematized Laurence connings, his tazza circumnavigated progresses counterclockwise. Florentine Brooke becharms intriguingly and slubberingly, she overestimate her blackmailers disenthralling anear. Haciendo ésto tu ps store brings together to speak, not received multiple parties in turn on your smart tv show you enter your This field may get back to squad up the playstation network password reset email not received the queries to make sure you! Redemption has responded by any older browsers. How to receive a function is invalid or try resetting your. It not reset playstation network connection with your location information was able to receive emails is subscribed to change significantly over the. Resetting your PlayStation password is the simple interest if you've forgotten it. You gave use not following method to reset your password if customer forget it. How to phone someone aware of your ps4 account. The undergarment featured two matching thin straps that went around each shoulder. Free PSN codes and roblox free robux can be easily obtained if you know how to get them, and can get you a lot of benefits. Our growing community spans all tiers of government and public services, and allows members to network, benchmark and share best practice on a secure and members. You will receive your reset email and be able to get back to enjoying your online gaming. I RECEIVED A VERIFICATION EMAIL OR PASSWORD RESET EMAIL THAT issue DID NOT intact You can disregard the email We won't email.
    [Show full text]
  • Playstation Network Parent Guide
    PSN: A Parent’s Guide Main Concerns for Parents E S T R I C R T I E O What is The PlayStation Network? G N A 18+ The PlayStation Network (PSN) is an online gaming and media content distribution service owned and operated by Sony Network Entertainment International. Users Cyberbullying have access to games (instantly downloadable), TV, video, movies, On the PlayStation Network you can play games, interact, chat and more music and much more. with friends. When your child plays a game online against others, there is the potential that their fellow gamers abuse or harass them or use bullying tactics to win games. Inappropriate content What does it look like? If your child plays with older children they may encounter swearing or be involved in discussions on subjects they don’t understand or find disturbing. Many online games also include adult themes, such as war and death, swearing and sexual content that won’t be suitable for every child. Encourages violence Although many believe that gaming can teach us about working as a team or being a good loser and many video games encourage players to use their imaginations to create brand new worlds and characters, some are concerned that games can encourage violence and conflict. Cyber theft In 2017 a hacker group claimed it had breached Sony’s PlayStation Network and stolen information, including usernames, names and emails. In 2011, following a cyberattack the personal details from approximately 77 million accounts were compromised and prevented users of PlayStation 3 and PlayStation Portable consoles from accessing the service.
    [Show full text]
  • Adam Kiciński (AK): Good Afternoon, Thank You for Joining the Call. My
    Adam Kiciński (AK): Good afternoon, Thank you for joining the call. My name is Adam Kiciński and I am the Joint-CEO of CD PROJEKT. This meeting was organized to discuss the situation right after the launch of Cyberpunk 2077. At the beginning I will present our current view of the situation which we are in today. After that, you will have time to ask questions. I’m with Piotr Nielubowicz, our CFO, Marcin Iwiński the Joint-CEO and co- founder, and Michał Nowakowski, Board Member responsible for publishing. We released Cyberpunk 2077 4 days ago on December the 10th. The game had a strong opening and we’ve got positive feedback from players enjoying it on stronger machines — PCs and next gen consoles and Stadia — but the initial feedback from those playing it on the oldest last-gen consoles is way below our expectations. CD PROJEKT is a team that puts all their efforts and hearts to deliver amazing games. So how was it even possible that it has come to this? After 3 delays, we as the Management Board were too focused on releasing the game. We underestimated the scale and complexity of the issues, we ignored the signals about the need for additional time to refine the game on the base last-gen consoles. It was the wrong approach and against our business philosophy. On top of that, during the campaign, we showed the game mostly on PCs. This caused the loss of gamers’ trust and the reputation that we’ve been building through a big part of our lives.
    [Show full text]
  • Caccuri V. Sony Interactive Entertainment
    Case 3:21-cv-03361 Document 1 Filed 05/05/21 Page 1 of 25 1 Jeff S. Westerman (SBN 94559) WESTERMAN LAW CORP. 2 16133 Ventura Blvd., Suite 685 Encino, CA 91436 3 Tel: (310) 698-7450 4 [email protected] 5 Michael M. Buchman (pro hac vice forthcoming) Michelle C. Clerkin (pro hac vice forthcoming) 6 Jacob O. Onile-Ere (pro hac vice forthcoming) MOTLEY RICE LLC 7 777 Third Avenue, 27th Floor 8 New York, NY 10017 Tel: (212) 577-0050 9 [email protected] [email protected] 10 [email protected] 11 Attorneys for Plaintiff and the Proposed Class 12 [Additional Counsel listed on signature page] 13 UNITED STATES DISTRICT COURT 14 NORTHERN DISTRCT OF CALIFORNIA 15 SAN FRANCISCO DIVISION 16 AGUSTIN CACCURI, on behalf of himself 17 and all others similarly situated, Civil Action No. 18 Plaintiff, 19 CLASS ACTION COMPLAINT v. 20 SONY INTERACTIVE ENTERTAINMENT 21 LLC, DEMAND FOR JURY TRIAL Defendant. 22 23 24 25 26 27 28 Case 3:21-cv-03361 Document 1 Filed 05/05/21 Page 2 of 25 1 Plaintiff Agustin Caccuri, on behalf of himself and all others similarly situated, brings 2 this Class Action Complaint against Sony Interactive Entertainment LLC for violation of federal 3 and state antitrust and unfair competition laws. Based upon personal knowledge, information and 4 belief, and the investigation of counsel, Plaintiff alleges as follows: 5 I. INTRODUCTION 6 1. This is an antitrust and unfair competition class action seeking damages and 7 injunctive relief for violation of Section 2 of the Sherman Antitrust Act, 15 U.S.C.
    [Show full text]
  • God of War 4 Pc Game Download Kickas
    God of war 4 pc game download kickas Continue PlayStation 4 games can be huge, and take hours to download. Fortunately, you can start downloading games even when you are away from home. All you need is an official Sony smartphone app, or a web browser on any computer. This will only work with digital games. If you have a physical copy of the game, you should put it in the PlayStation 4 drive before the console starts installing it and downloading any updates (obviously). However, you can buy digital games away from home and they will be automatically downloaded on PS4. Check out RELATED rest settings: Should I use PlayStation 4 Rest Mode or turn it off? This requires using the right energy-saving settings on PlayStation 4. In normal rest mode, PlayStation 4 will stay in touch with Sony's servers and automatically wake up to download updates and games that you are queuing up to download. If you are away from the console right now, you can skip this step and just try downloading the game you want to download. Assuming that your PS4 is on its default holiday setting, it will just work. However, if you've previously disabled this feature on your console, the game won't start downloading immediately. It will automatically load when you return home and turn on the PS4. To check out this setup on ps4, head to the settings for energy-saving settings, and features available in rest mode. Make sure the Stay on the Internet option is on. This will allow ps4 to wake up and download games and updates.
    [Show full text]
  • Gaikai - Wikipedia Case 3:19-Cv-07027-WHA Document 28-2 Filed 10/14/19 Page 2 of 8 Not Logged in Talk Contributions Create Account Log In
    Case 3:19-cv-07027-WHA Document 28-2 Filed 10/14/19 Page 1 of 8 EXHIBIT B Gaikai - Wikipedia Case 3:19-cv-07027-WHA Document 28-2 Filed 10/14/19 Page 2 of 8 Not logged in Talk Contributions Create account Log in Article Talk Read Edit View history Gaikai From Wikipedia, the free encyclopedia Main page Gaikai (外海, lit. "open sea", i.e. an expansive outdoor space) is an American company which provides technology for the streaming of high- Contents Gaikai Featured content end video games.[1] Founded in 2008, it was acquired by Sony Interactive Entertainment in 2012. Its technology has multiple applications, Current events including in-home streaming over a local wired or wireless network (as in Remote Play between the PlayStation 4 and PlayStation Vita), as Random article well as cloud-based gaming where video games are rendered on remote servers and delivered to end users via internet streaming (such as Donate to Wikipedia the PlayStation Now game streaming service.[2]) As a startup, before its acquisition by Sony, the company announced many partners using Wikipedia store [3] the technology from 2010 through 2012 including game publishers, web portals, retailers and consumer electronics manufacturers. On July Founded November 2008 Interaction 2, 2012, Sony announced that a formal agreement had been reached to acquire the company for $380 million USD with plans of establishing Headquarters Aliso Viejo, California, U.S. [4] Help their own new cloud-based gaming service, as well as integrating streaming technology built by Gaikai into PlayStation products, resulting Owner Sony [5] [6] About Wikipedia in PlayStation Now and Remote Play.
    [Show full text]
  • Enabling Secure, Fast, and Immersive Gaming Experiences
    Enabling Secure, Fast, and Immersive Gaming Experiences Common Challenges & Winning Solutions for Game Developers 1 888 99 FLARE | [email protected] | www.cloudflare.com PART 1 Cybersecurity: Beating hackers at their own game Game development is an intricate, time-consuming process, and the work doesn’t stop after a title is released. To keep players engaged, game companies must continually push out new, cutting-edge features and ensure nothing less than world-class performance and 100% uptime, all while ensuring that cyber attacks don’t compromise game integrity or the user experience. Traditionally, game platforms have prioritized user experience over cybersecurity, fearing that robust security and authentication measures, such as SSL/TLS, would increase latency and cause user attrition. However, as gaming grew into the world’s most popular and lucrative form of entertainment,1 hackers began heavily targeting the industry, negatively impacting game performance and integrity. Defending against DDoS attacks DDoS attacks have long plagued online games. Over the Christmas holidays in 2013, hacker Austin Thompson launched a series of DDoS attacks against popular gaming sites, including Steam, PlayStation Network, Microsoft Xbox, Riot Games, and League of Legends.2 Thompson’s antics inspired throngs of copycats; end-of-year DDoS attacks on online gaming platforms became so common that days before Christmas 2018, the FBI, in partnership with UK and Netherlands law enforcement agencies, preemptively seized 15 domains belonging to DDoS-for-hire services.3 Unfortunately, this virtual raid didn’t quell the growth of denial of service attacks. Kaspersky found an 18% year-over-year increase in DDoS attacks during Q2 2019, and a 32% increase in application- layer attacks,4 a highly sophisticated form of DDoS attack that utilizes malicious bots to attack specific applications.
    [Show full text]
  • Playstation®Network Expands Digital Offering with a Variety of Entertainment
    FOR IMMEDIATE RELEASE Contacts: Abigail Murphy – 650.655.5510 [email protected] Ron Eagle – 858.824.5585 [email protected] PLAYSTATION®NETWORK EXPANDS DIGITAL OFFERING WITH A VARIETY OF ENTERTAINMENT Video and Game Content for the PSP® (PlayStation®Portable) and PLAYSTATION®3 systems Los Angeles, Calif., June 2, 2009 – Sony Computer Entertainment America, Inc. (SCEA) announced today major enhancements to PlayStation®Network, expanding on SCEA’s commitment to give users a comprehensive entertainment experience. The video delivery service for the PSP® (PlayStation® Portable) system launches today in coordination with a new line-up of premier Hollywood, Anime and Sports partners. In addition, Media Go, a free application that makes it easier to manage digital content including games, photos, videos and music for PSP through a PC will also become available. These enhancements give new entertainment possibilities for PSP owners, providing direct downloadable access to games, demos and trailers, as well as movies and television shows via the PlayStation®Store on PlayStation Network. New game content will also be added to an existing library of more than 200 downloadable games on the PlayStation Store today, including much anticipated titles Fat Princess: Fistful of Cake, Gravity Crash™, Hustle Kings and more than 60 PS one Classics hitting the PlayStation Store by the end of the year. “PlayStation Network has experienced a high growth year and today we’re excited to add new content partners such as Showtime, G4 & E!, Magnolia Films, and TNA to our family. In addition to extending our content offerings and expanding with new features like Media Go, we continue to bring relevant and compelling content via original games and programming to our users,” said Peter Dille, senior vice president marketing and PlayStation Network, SCEA.
    [Show full text]
  • Video Game Collections in an Academic Library
    Video Game Collections in an Academic Library Diane Robson Media Librarian University of North Texas November 18, 2015 #alctsce OVERVIEW • Do Games Belong in Libraries? • Collections & Programs • Starting Your Game Collection • UNT’s Collection • Licensing • Emerging Digital Resources • Building a Robust Collection Despite These Issues • Keep Collecting Physical Items 2 TERMS TO KNOW Digital Rights Management Game platform/portal – allow (DRM) – controls the use of digital distribution of digital content content and devices after sale Emulator – allows an electronic 1st generation – limits illegal device to imitate another program copying and distribution or device 2nd generation – limits access to Stand-alone PC – no internet or legally obtained materials network connectivity 3 DO GAMES BELONG IN LIBRARIES? 4 GAMES HAVE CULTURAL SIGNIFICANCE YOU HAVE DIED OF DYSENTERY 5 “Games create a compelling need to know, a need to ask, examine, assimilate and master certain skills and content areas. Some experts argue that games are, first and foremost, learning systems, and that this accounts for the sense of engagement and entertainment players experience.” – Institute of Play 6 Who is playing games? STATISTICS 155 million people in America 51% of households own a game console 42% of Americans play games regularly Players Average age: 34 years old 67% of households play video games 40% gamers are women Industry $22 billion in revenue 52% of this revenue was for digital content 146,000 people employed directly or indirectly (www.theesa.com) 7 COLLECTIONS & PROGRAMS 8 LIBRARY GAME COLLECTIONS Libraries have a part to play in the preservation and collection of games for future generations. Archival collections Preservation of games & digital artifacts related to games 9 LIBRARY GAME COLLECTIONS Research collections Aid in study and teaching of games and game design •400 U.S.
    [Show full text]