Rosette Diceless Companion Now Available

Join our newsletter

Tag archives: zero-day-is-waiting

Exploit: Zero Day "Headless Swarm" Coming December 1

Exploit: Zero Day "Headless Swarm" Coming December 1

Our web-based cyberthriller puzzle game Exploit: Zero Day lets you play as a hacktivist, uncovering and battling against oppression and exploitation. It's been in closed alpha for a while, but soon it will be available without waiting in line thanks to our prelude season of paid story: "Headless Swarm." This ...

Continue reading ⇒

How to Make Game Code Business Cards

How to Make Game Code Business Cards

When we decided to go to the GDC this year, we knew we wanted to give out access codes to Exploit: Zero Day when we spoke to people. The easiest way to give out a code to EZD is with a link that includes the code and will guide the player to register, then apply the code.

I set out to create labels containing both a QR code and a shortlink that could be affixed to the back of our business cards. It took quite a bit of trial and error to make this process smooth, but a combination of a Google Spreadsheet, Excel, and Microsoft Word 2013/365 got the job done. Unfortunately, this process won't work with Word 2007 or 2010.

All this work is worth it, though, to have the back of my business card look like this:

The back of my business card with a fancy label on it.

Join me on this sweet and technical ride of mail merging.

...

Continue reading ⇒

/%!cyber liberation is a SCAM

Our promot10n4l p4rtn3r Samsara Diggg$11SIGSEGVć̢҉rą́c҉͝k̶̴͡e͜͟d̷ ̕b͝y̵̧ ̨́͝z̢҉́e̴r̛͢͠o͢͜ ͏̴d̸a̶̕y̨

don't let samsara get their bloody hands on your systems. everything about them is a lie. they have killed and stolen and ruined lives. zero day is watching and waiting and we will hold them accountable.

the binders come from Vedas and ...

Continue reading ⇒

Samsara Digital Upcoming Announcement

Samsara Digital Logo

We are pleased to announce a promotional video from our marketing partners, Samsara Digital. You've probably heard of them in the context of automated financial manipulation software or as part of the growing discussion about corporate security personnel. As we've been recently involved in a lot of server and deployment ...

Continue reading ⇒