The process of acquiring and installing the unofficial modification “Super Mariomon” typically involves searching for available download links on websites that host fan-made game content or modifications. These sources may include forums dedicated to game hacking, online repositories of custom game files, or video-sharing platforms where creators showcase their work and often provide links to obtain the content. One must exercise caution when navigating these platforms and verifying the safety and integrity of the downloaded files.
Accessing and playing such modifications can provide players with unique experiences by altering established game mechanics, introducing new characters, or presenting novel challenges. This can extend the lifespan of a beloved game and offer a different perspective on its core gameplay. However, it is important to be aware of the potential legal and security implications, particularly regarding copyright infringement and the risk of downloading malicious software. Historically, fan-made modifications have often been developed as expressions of creativity and passion within gaming communities, but their distribution and use are frequently governed by the original game’s terms of service and applicable copyright laws.
Therefore, before proceeding with any attempt to acquire and run this modified game, it is crucial to understand the possible risks and to consider the legal ramifications of downloading and utilizing content that infringes upon copyright. Subsequent sections will explore best practices for verifying file safety, navigating potential copyright issues, and understanding the technical requirements for running the modified game on various platforms.
1. Source Legitimacy
The process of acquiring “Super Mariomon” is inextricably linked to the legitimacy of the source from which the download originates. A reputable source offers assurances regarding the integrity and safety of the downloaded file. Conversely, downloading from an unverified or dubious source introduces significant risks, primarily the potential for malware infection. The causal relationship is direct: the selection of a trustworthy source precipitates a safe download, while choosing an illegitimate source increases the probability of encountering malicious software disguised as the intended modification. The importance of source legitimacy cannot be overstated, as it forms the foundation of a secure and responsible acquisition process.
Real-life examples abound of individuals who have inadvertently downloaded malware while attempting to obtain fan-made game modifications. These instances underscore the critical need for vigilance. Established forums dedicated to game modifications often vet their members and monitor posted links for potential threats. Conversely, file-sharing websites with minimal moderation are frequently exploited by malicious actors seeking to distribute infected files. The practical significance of understanding this lies in the ability to distinguish between potentially safe and inherently dangerous download locations. Recognizing signs of a legitimate source such as a clearly defined moderation policy, positive community feedback, and a history of providing safe downloads is paramount.
In conclusion, the legitimacy of the download source is the cornerstone of a safe and responsible approach to acquiring “Super Mariomon.” Neglecting this aspect introduces unacceptable risks to device security and data privacy. The challenges associated with verifying source legitimacy can be mitigated by adopting a cautious approach, relying on trusted communities, and critically evaluating the reputation of the hosting website. Prioritizing source legitimacy aligns with the broader theme of responsible digital citizenship and the mitigation of online threats.
2. File Verification
The process of obtaining “Super Mariomon” necessitates rigorous file verification to ensure the downloaded file is both authentic and free from malicious code. The steps taken during file verification are directly proportional to the safety and security of the user’s system. Neglecting this crucial stage opens the door to potential vulnerabilities.
-
Checksum Verification
Checksums, such as MD5 or SHA-256 hashes, provide a unique digital fingerprint of a file. Comparing the checksum provided by a trusted source (e.g., the forum where the modification was announced) with the checksum of the downloaded file confirms its integrity. Discrepancies indicate that the file has been altered or corrupted, potentially by malicious actors. For example, if the published MD5 hash is different from the computed MD5 hash after downloading “Super Mariomon,” the file should not be used.
-
Antivirus Scanning
Employing a reputable antivirus program to scan the downloaded file before execution is a fundamental precaution. Antivirus software identifies and flags known malware signatures. However, it is important to recognize that no antivirus program offers absolute protection. Zero-day exploits and sophisticated malware may evade detection. Regular updates to the antivirus software’s definition database are essential for maintaining its effectiveness.
-
Sandbox Analysis
Executing the downloaded file within a sandbox environment creates a controlled space where its behavior can be monitored without affecting the host system. This allows for the identification of suspicious activities, such as attempts to modify system files or connect to unknown network addresses. While requiring technical expertise, sandbox analysis offers a higher level of security compared to simple antivirus scanning.
-
Source Code Review (If Available)
In some cases, the source code of the modification may be available. Reviewing the code, or having it reviewed by a trusted expert, can reveal hidden backdoors or malicious logic. This is the most thorough, but also the most demanding, method of file verification. However, for many end-users seeking “Super Mariomon,” access to the source code is unlikely, making this verification method impractical.
These verification methods, particularly checksum validation and antivirus scanning, constitute essential safeguards when downloading and using “Super Mariomon.” While complete certainty is unattainable, these measures significantly reduce the risk of encountering malicious software or corrupted files, contributing to a safer and more secure experience.
3. Copyright Awareness
Understanding copyright law is paramount when considering the acquisition and use of “Super Mariomon.” This fan-made modification often incorporates elements from copyrighted works, potentially infringing on the rights of the original copyright holders. Therefore, navigating the complexities of copyright is crucial for anyone seeking to obtain and utilize this modification legally and ethically.
-
Copyright Ownership of Original Game Assets
The original game, upon which “Super Mariomon” is based, is protected by copyright. This includes its characters, music, level designs, and code. Copyright law grants the copyright holder exclusive rights to reproduce, distribute, and create derivative works based on the original. Using these assets without permission, even within a modified version, can constitute copyright infringement. For instance, if “Super Mariomon” uses original music files without permission, the distributor or user could be liable for infringement.
-
Copyright Status of the Modification Itself
The legal status of “Super Mariomon” itself is complex. While the creator may hold copyright over the original elements they added to the modification, this does not negate the infringement stemming from the use of copyrighted material from the original game. If the modification substantially replicates or builds upon the original game’s copyrighted elements, it will likely be considered a derivative work, requiring permission from the original copyright holder. A real-world example is the takedown of fan games that closely mirrored the original IP, demonstrating the legal ramifications of derivative works.
-
Distribution and Downloading: A Copyright Perspective
The act of distributing or downloading “Super Mariomon” can also trigger copyright concerns. Distributing the modification without permission infringes the copyright holder’s right to distribute derivative works. Downloading the modification may be considered contributory infringement if the user is aware that the modification infringes on copyright. The legal implications extend to both those who share the files and those who knowingly download and use them. This is analogous to downloading copyrighted music or movies without authorization.
-
Fair Use and Transformative Works
The concept of fair use allows for limited use of copyrighted material without permission for purposes such as criticism, commentary, news reporting, teaching, scholarship, or research. However, fair use is a highly fact-specific determination, and whether “Super Mariomon” qualifies often depends on the extent to which it transforms the original work and whether it impacts the market for the original game. If “Super Mariomon” is considered a transformative work substantially altering the original and not merely replicating it a stronger argument for fair use can be made. An example of this is a parody, which uses copyrighted material for comedic effect and is often protected under fair use, though the specific application to modifications is often uncertain.
In conclusion, understanding copyright law is crucial before considering how to download and use “Super Mariomon.” The modification’s use of copyrighted assets, its status as a derivative work, the act of distribution and downloading, and the potential for fair use all contribute to the legal landscape surrounding this fan-made creation. Navigating this terrain requires careful consideration of copyright principles and an understanding of the potential legal risks involved. Due diligence in respecting copyright law is essential for mitigating legal exposure and ensuring ethical engagement with fan-made content.
4. Emulator Compatibility
The successful execution of “Super Mariomon,” following the process of obtaining it, is fundamentally dependent on emulator compatibility. The modified ROM, comprising the altered game data, requires an emulator designed to interpret and execute the code within. The appropriate emulator translates the ROM’s instructions into actions that the host device can perform, thereby rendering the game playable. A mismatch between the ROM’s intended platform and the emulator’s capabilities will result in either the game failing to load or encountering errors during gameplay. As an example, a “Super Mariomon” ROM modified for the Super Nintendo Entertainment System (SNES) architecture will not function correctly within a Game Boy Advance emulator. Similarly, failing to configure emulator settings, such as specifying the correct CPU speed or video output settings, can negatively affect game performance, introducing glitches or instability.
Determining the correct emulator involves identifying the original platform for which “Super Mariomon” was designed, a detail often documented alongside the ROM file itself or within associated online communities. Once identified, a compatible emulator must be selected and configured to match the original hardware specifications. Certain emulators offer advanced features such as save state management, cheat code support, and graphical enhancements. However, these features should be implemented judiciously, as they can introduce unforeseen compatibility issues with the modified ROM. A practical example is using specific graphical filter settings that may conflict with custom textures included in “Super Mariomon,” leading to visual artifacts. Verification of emulator functionality before loading the ROM is crucial; testing with known-good ROMs of other games designed for the same platform ensures the emulator is operating correctly. Therefore, emulator compatibility is not merely a technical consideration but an integral prerequisite for enjoying the intended gameplay experience of “Super Mariomon”.
In summary, the relationship between emulator compatibility and the ability to play “Super Mariomon” is direct and indispensable. Selecting and configuring the correct emulator based on the ROM’s intended platform is essential for successful game execution. Challenges may arise from incorrect emulator settings, unforeseen incompatibilities with advanced features, or a lack of clear documentation regarding the ROM’s original platform. Overcoming these challenges requires careful research, experimentation, and potentially consulting with online communities dedicated to emulation and game modifications. Successfully navigating this process ensures that the effort invested in obtaining “Super Mariomon” culminates in a playable and enjoyable experience, further emphasizing the practical importance of emulator compatibility within the context of accessing and utilizing this fan-made modification.
5. Device Security
The act of acquiring “Super Mariomon,” particularly the “how to download super mariomon” phase, is directly connected to device security. The download process introduces potential risks that can compromise the integrity and security of the device involved. Neglecting appropriate security measures can lead to malware infections, data breaches, and system instability. The causal relationship is clear: unsecured downloads increase the likelihood of security compromises. A compromised device may be used for malicious purposes, such as spreading malware, participating in botnets, or stealing personal information. The importance of device security as a component of “how to download super mariomon” is therefore paramount. Real-life examples include instances where users downloading ROMs or game modifications from untrusted sources inadvertently installed ransomware or keyloggers, resulting in significant financial or data loss. The practical significance lies in recognizing the download process as a potential attack vector and implementing preventative measures.
Effective device security requires a multi-layered approach. This includes employing up-to-date antivirus software, utilizing firewalls, and exercising caution when granting software permissions. Prior to downloading “Super Mariomon,” users should verify the source’s reputation and examine the file for suspicious characteristics. Post-download, the file should be scanned with antivirus software before execution. Furthermore, it is prudent to create system backups to mitigate the impact of potential malware infections. Sandboxing or virtual machines can provide a controlled environment for testing potentially risky software. Understanding the file extensions associated with “Super Mariomon” (e.g., ROM files, executables) and recognizing potentially malicious masquerades (e.g., `.exe` files disguised as image files) is also critical.
In summary, “how to download super mariomon” should be approached with a strong emphasis on device security. The potential risks associated with downloading software from untrusted sources necessitate proactive security measures. Challenges include identifying legitimate sources, detecting sophisticated malware, and maintaining vigilance against evolving threats. The broader theme is responsible digital citizenship, emphasizing the importance of protecting one’s device and data from malicious actors. A comprehensive security strategy, coupled with a cautious approach to downloading, mitigates the risks and promotes a safer online experience.
6. Installation Process
The installation process is the logical and practical consequence of the “how to download super mariomon” inquiry. Once the digital file representing the modified game has been acquired, its usability is entirely contingent on a successful installation. An improperly executed installation renders the downloaded file inert and unusable. The steps required for installation vary based on the format of the downloaded file (e.g., a ROM image, a patch file, or a standalone executable) and the platform on which it is intended to be played (e.g., a dedicated emulator on a PC, a custom firmware on a handheld device). The importance of the installation process as a direct component of “how to download super mariomon” is undeniable; the entire effort of acquiring the file is nullified without a corresponding understanding and execution of the necessary installation steps. Examples include users attempting to play a ROM image directly without an emulator, or failing to apply a patch file correctly, resulting in a corrupted or non-functional game. This demonstrates that effective completion of the installation process is not merely a technicality but a critical prerequisite for gameplay.
The installation process may involve several distinct steps, each requiring careful attention. For ROM images, the user must first obtain and configure a compatible emulator. This involves selecting an emulator that supports the target system (e.g., SNES, Game Boy) and configuring settings such as video output, input mappings, and audio settings. For patch files, the user must typically apply the patch to a clean ROM image of the original game, using a patching utility (e.g., Lunar IPS). This requires precise matching of the original ROM with the patch and ensuring the patching process completes without errors. In cases where “Super Mariomon” is distributed as a standalone executable, the installation may involve running the executable and following on-screen prompts to install the game files to a designated directory. Regardless of the specific method, understanding the required steps and executing them correctly is vital for achieving a functional installation. Common pitfalls include downloading incompatible emulators, applying patches incorrectly, and overlooking essential configuration settings.
In summary, the installation process represents the culmination of the “how to download super mariomon” effort, transforming a downloaded file into a playable game. The challenges include navigating the complexities of emulator configuration, understanding patch application procedures, and avoiding common installation errors. Successfully overcoming these challenges requires a methodical approach, careful attention to detail, and a willingness to consult online resources for assistance. The broader theme is the translation of digital acquisition into tangible usability, emphasizing that downloading is only the first step towards realizing the intended purpose. Proper installation ensures that “Super Mariomon” functions as intended, thereby fulfilling the initial objective of the download process.
7. Game Legality
The concept of game legality is inextricably linked to any discussion of “how to download super mariomon.” The act of downloading, possessing, and playing a video game, particularly a modified version, raises several legal questions pertaining to copyright, intellectual property rights, and distribution agreements. Ignoring these considerations can lead to legal repercussions. The following aspects delineate the key facets of game legality in relation to the acquisition and use of such content.
-
Copyright Infringement of Original Game
The foundation of any modified game rests upon the original game’s copyrighted assets, including code, characters, music, and artwork. Downloading and using “Super Mariomon” often involves possessing a copy of the original game’s ROM, which may be illegal if obtained without proper authorization. For instance, downloading a ROM of “Super Mario World” to play “Super Mariomon” without owning a legitimate copy of the original game constitutes copyright infringement. This act violates the copyright holder’s exclusive rights to reproduce and distribute their work. Such infringement can lead to legal action from the copyright holder, including fines and other penalties.
-
Legality of ROM Emulation
Emulation, the act of using software to mimic the hardware of a video game console, is not inherently illegal. However, the legality hinges on the source and use of the ROMs used within the emulator. Owning a physical copy of a game typically grants the right to create a personal backup copy, but downloading ROMs from the internet is generally considered illegal unless the game has been released into the public domain or the copyright holder has explicitly authorized free distribution. The connection to “how to download super mariomon” is direct: using an emulator to play “Super Mariomon” requires obtaining a ROM, the legality of which directly impacts the user’s legal standing.
-
Distribution of Modified Games
The act of distributing “Super Mariomon” also raises significant legal concerns. Even if the modification is free, distributing it without permission from the copyright holder of the original game is a violation of copyright law. The act of sharing the download file, even with friends, constitutes distribution, which infringes on the copyright holder’s exclusive right to distribute their work and create derivative works. This has been seen in cases where developers have issued cease and desist letters to fan projects distributing modified versions of their games, underscoring the legal ramifications of such actions.
-
Terms of Service and End-User License Agreements (EULAs)
Most games are governed by Terms of Service (TOS) and End-User License Agreements (EULAs), which outline the permissible uses of the game and its assets. These agreements often prohibit reverse engineering, modification, and redistribution of the game. Downloading and using “Super Mariomon” may violate these agreements, even if the user owns a legitimate copy of the original game. Violating the TOS or EULA can result in account bans or other penalties, depending on the specific terms outlined in the agreement. This facet highlights that legality is not solely determined by copyright law but also by contractual agreements between the user and the game publisher.
These facets underscore the critical importance of understanding the legal landscape surrounding “how to download super mariomon.” The act of downloading and using modified games, while often driven by enthusiasm and creativity, can have significant legal implications. Adherence to copyright laws, understanding of ROM emulation legality, awareness of distribution restrictions, and compliance with TOS/EULA agreements are all essential considerations for those seeking to navigate the complex legal terrain of fan-made game modifications. A disregard for these legal facets can expose individuals to potential legal risks and liabilities.
8. Rom Acquisition
Rom acquisition represents a critical and often legally complex component of “how to download super mariomon.” The phrase “super mariomon” typically refers to a modified version of an existing “Super Mario” game. These modifications frequently require a base ROM image of the original game to function. The process of acquiring this ROM, a digital copy of the game’s data, is therefore a prerequisite step. A direct causal relationship exists: without a valid ROM, the modified game cannot be played. The importance of rom acquisition in the context of “how to download super mariomon” stems from its role as the foundational element upon which the modification is built. For example, a user seeking to play “Super Mariomon X” must first possess the ROM for “Super Mario World” to apply the modification. The legality and safety of the entire endeavor are often determined at this stage.
Practical application involves identifying a legitimate source for the ROM, if such a source exists given copyright restrictions. While owning the original game cartridge may provide a legal basis for creating a personal backup ROM, downloading a ROM from the internet without owning the original game is generally considered copyright infringement. This act carries legal risks. Emulation websites and file-sharing platforms are common sources for ROMs, but their reliability and legality vary considerably. Some may distribute ROMs without permission from the copyright holders, while others might contain malware disguised as ROM files. Secure and reliable ROM acquisition often involves verifying file integrity through checksums (MD5 or SHA-256 hashes) and scanning downloaded files with reputable antivirus software. A practical example is comparing the MD5 hash of a downloaded ROM with the hash provided by a trusted source to confirm its authenticity and prevent the use of a corrupted or malicious file.
In summary, rom acquisition is an indispensable but potentially fraught step in “how to download super mariomon”. The challenges include navigating copyright laws, identifying reputable download sources, and verifying file integrity. Successfully addressing these challenges requires a combination of legal awareness, technical proficiency, and cautious decision-making. The broader theme involves navigating the complexities of intellectual property rights in the digital age. A responsible approach to rom acquisition is crucial for mitigating legal risks and ensuring a safe and ethical gaming experience when exploring modifications such as “Super Mariomon”.
9. Potential Risks
The pursuit of “how to download super mariomon” inherently entails exposure to various potential risks. The process, involving the acquisition of files from potentially untrusted sources, creates vulnerabilities that can compromise device security and legal standing. The correlation between the actions involved in downloading and the resultant risks is direct; increased vigilance and preventative measures reduce the likelihood of adverse outcomes. The importance of recognizing potential risks as an integral component of “how to download super mariomon” is paramount, as it informs decision-making and promotes responsible conduct. Real-life examples include malware infections stemming from corrupted downloads, copyright infringement lawsuits resulting from unauthorized rom acquisition, and system instability caused by incompatible modifications. The practical significance of understanding these risks lies in the ability to make informed choices, prioritizing safety and legality over ease of access.
Specific risks associated with the “how to download super mariomon” endeavor include malware infection, copyright infringement, data breaches, and system instability. Malware, disguised as game files, can compromise device security and expose personal information. Copyright infringement occurs when copyrighted material is downloaded and used without proper authorization, leading to potential legal consequences. Data breaches can result from downloading files from untrusted sources, exposing sensitive information to malicious actors. System instability can arise from installing incompatible modifications or emulators, leading to errors, crashes, and potential data loss. These risks are not mutually exclusive; a single download can potentially expose a user to multiple threats. The careful selection of download sources, the verification of file integrity, and the implementation of appropriate security measures can mitigate these risks.
In summary, the intersection of “Potential Risks” and “how to download super mariomon” highlights the necessity for caution and awareness. The challenges involve balancing the desire to access modified game content with the need to protect device security and legal rights. Successfully navigating this intersection requires a proactive approach, encompassing source verification, file integrity checks, and an understanding of relevant legal frameworks. The broader theme revolves around responsible digital citizenship and the ethical considerations surrounding the acquisition and use of copyrighted material. A comprehensive risk assessment, coupled with diligent preventative measures, minimizes potential harm and promotes a safer gaming experience.
Frequently Asked Questions about Obtaining “Super Mariomon”
This section addresses common inquiries and concerns regarding the acquisition and use of “Super Mariomon,” a fan-made game modification. The information presented aims to provide clarity and promote responsible practices.
Question 1: Is downloading “Super Mariomon” legal?
The legality of downloading “Super Mariomon” is contingent upon copyright law and ownership of the original game. If “Super Mariomon” utilizes copyrighted assets from the original game and is distributed without permission, downloading it may constitute copyright infringement, unless covered by fair use exemptions.
Question 2: What are the potential risks associated with downloading “Super Mariomon”?
Potential risks include malware infection from untrusted sources, copyright infringement leading to legal repercussions, and system instability caused by incompatible modifications or emulators. Verifying file integrity and using reputable sources are crucial for mitigating these risks.
Question 3: How can the safety of a “Super Mariomon” download be verified?
File safety can be verified by comparing the file’s checksum (MD5 or SHA-256) with a known good checksum from a trusted source, scanning the file with up-to-date antivirus software, and, if feasible, analyzing the file in a sandbox environment.
Question 4: What is the role of an emulator in playing “Super Mariomon”?
An emulator is software that mimics the hardware of the original gaming console. “Super Mariomon,” being a modification, typically requires an emulator to run on modern devices. Selecting an emulator compatible with the original game’s platform is essential for successful gameplay.
Question 5: Does owning the original game make downloading “Super Mariomon” legal?
Owning the original game may not automatically legalize the downloading and use of “Super Mariomon.” The modification itself may still infringe on copyright if it distributes or alters copyrighted content without permission. Permission from the copyright holder, or fair use, must be considered.
Question 6: Where are reputable and safe sources to find information on “Super Mariomon”?
Reputable sources for information on “Super Mariomon” include established forums dedicated to game modifications, websites with clear moderation policies and positive community feedback, and video-sharing platforms with trusted content creators who provide verifiable download links.
These frequently asked questions highlight the key considerations regarding the acquisition and use of “Super Mariomon.” Prioritizing legality, safety, and responsible practices is essential for a positive and ethical gaming experience.
The subsequent section will explore advanced topics pertaining to the technical aspects of installing and running “Super Mariomon,” including troubleshooting common issues.
Tips for Navigating “how to download super mariomon” Safely and Legally
The following tips provide guidance for individuals seeking to obtain “Super Mariomon” while mitigating potential risks and adhering to legal boundaries. These recommendations are intended to promote responsible practices and informed decision-making.
Tip 1: Prioritize Source Verification: Before initiating any download, thoroughly evaluate the source’s reputation. Favor established forums dedicated to game modifications or websites with clear moderation policies and positive community feedback. Avoid sources with questionable legitimacy or a history of distributing malware.
Tip 2: Employ Checksum Validation: Upon downloading the file, compare its checksum (MD5, SHA-256) with a known good checksum from a trusted source. A mismatch indicates file corruption or tampering and necessitates immediate termination of the process.
Tip 3: Conduct Antivirus Scanning: Scan the downloaded file with up-to-date antivirus software prior to execution. While no antivirus solution provides absolute guarantee, this step can identify known malware signatures and mitigate potential threats.
Tip 4: Understand Copyright Implications: Familiarize oneself with copyright law and the legal ramifications of downloading and using copyrighted material without authorization. Owning the original game does not necessarily legalize the use of modified versions; permission or fair use exceptions must be considered.
Tip 5: Exercise Emulator Prudence: Select an emulator that is compatible with the original game’s platform and configure it appropriately. Incorrect emulator settings can lead to instability or incompatibility issues. Test the emulator with known-good ROMs before attempting to run “Super Mariomon.”
Tip 6: Implement Sandboxing Techniques: For advanced users, consider utilizing a sandbox environment or virtual machine to test potentially risky software before installing it on the primary system. This provides an isolated environment for detecting suspicious behavior.
Tip 7: Regularly Update Security Software: Maintain up-to-date antivirus definitions, operating system patches, and security software to protect against emerging threats. Regular updates are crucial for mitigating vulnerabilities and preventing malware infections.
These tips underscore the importance of proactive security measures, legal awareness, and informed decision-making when pursuing “how to download super mariomon.” Adherence to these guidelines reduces the risk of encountering malware, violating copyright laws, and compromising system integrity.
The subsequent section will provide a comprehensive conclusion, summarizing the key considerations and reiterating the importance of responsible practices.
Conclusion
This exploration of “how to download super mariomon” has underscored the multifaceted nature of the process. Emphasis has been placed on legal considerations, security protocols, and technical prerequisites. The acquisition of the game modification necessitates a comprehensive understanding of copyright law, file verification techniques, and emulator compatibility. Navigating this landscape requires diligence, caution, and a commitment to responsible digital citizenship.
The pursuit of enhanced gaming experiences must be balanced with ethical considerations and a proactive approach to risk mitigation. Individuals seeking to engage with modifications such as “Super Mariomon” are urged to prioritize legality, security, and responsible practices. The long-term health of the gaming community depends on a collective commitment to ethical behavior and the protection of intellectual property rights.