Why do hackers play as Battle Mages?

Printable View