4128 Shares

I bet you can't solve this. Only pro's can?

I bet you can't solve this. Only pro's can? Topic: Computer algorithm and problem solving
June 17, 2019 / By Cedric
Question: 9ec4c12949a4f31474f299058ce2b22a. This contains a computer code that ties a command back to the early days of computer networking. It's suspected to be a cryptographic algorithm called an MD5 hash. Now, the problem is, I can't figure out if this would result in, say, key parts of something, or the entire thing. So, try to get it. 9ec4c12949a4f31474f299058ce2b22a No stupid answers. What is the code. The code. What does it mean? That's my question, if you're confused. What does it mean? It's more than just: USCYBERCOM plans, coordinates, integrates, synchronizes, and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full-spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries. And even then... Is that all of it or just bits and pieces of the full thing?
Best Answer

Best Answers: I bet you can't solve this. Only pro's can?

Allystair Allystair | 2 days ago
It says "USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries." UPDATE: That's the full thing. It's highly improbable (Less than a 0.000001% chance) it means anything else. UPDATE2: It's just taken from the wikipedia article. http://en.wikipedia.org/wiki/United_States_Cyber_Command
👍 152 | 👎 2
Did you like the answer? I bet you can't solve this. Only pro's can? Share with your friends

We found more questions related to the topic: Computer algorithm and problem solving


Allystair Originally Answered: Using factoring to solve problems? solve by writing and factoring quadratic equations?
8. The sum of the squares of 2 consectutive negtive integers is 100; Find the intergers. x^2+(x+1)^2 = 100 x^2+x^2+2x+1 = 100 2x^2 + 2x - 99 = 0 You'll find there's no solution. 10. The length of a rectangle is 6cm less than twice its width. Find the dimesions of the rectangle if its area is 108cm^2. 108 = x(2x-6) 108 = 2x^2 - 6x 2x^2 - 6x - 108 = 0 x^2 - 3x - 54 = 0 (x-9)(x+6) = 0 x=9, since x=-6 is negative So 9 X 12 = 108 12. 2x+2y = 42 ---> x+y=21 xy = 104 x(21-x)=104 21x-x^2=104 x^2 - 21x + 104 = 0 (x-13)(x-8)=0 x=13 and x=8 13 X 8 = 194 14. The difference of 2 positive integers is 5 and the sum of their squares is 233. What are the numbers? x-y = 5 x^2 + y^2 = 233 x^2 + (x-5)^2 = 233 x^2 + x^2 - 10x + 25 = 233 2x^2 -10x - 208 = 0 x^2 - 5x - 104 = 0 (x-13)(x+8) = 0 The numbers are 13 and 8. 16. Originally a rectangle was twice as long as it was wide. When 4cm were added to its length and 3m subtracted from its width, the resulting rectangle had an area of 600cm^2. Find the dimensions of the new rectangle. Original rectangle x and 2x (2x+4)(x-3) = 600 2x^2 - 6x + 4x - 12 = 600 2x^2 -2x - 612 = 0 x^2-x-306=0 (x-18)(x+17)=0 x=18 Dimensions are 40 X 15

Terrie Terrie
MD5 is, as you say, a hash. That means that it's 32 characters, regardless of what it's a hash of. It could be a hash of a blank string (no characters - the MD5 of that is D41D8CD98F00B204E9800998ECF8427E) or a hash of a 4GB file - it'll still be 32 characters long. So if you're asking someone to "decrypt" the hash, or tell you *anything* about the original data, it can't be done.
👍 60 | 👎 -6

Rosalin Rosalin
I was looking for the question in your "question." There are no question marks. What are you asking? MD5 hashes are commonplace. Especially in the free software community, as they are used to verify and confirm the files you download are precisely what you think you are getting. You download a file and download the hash and then compare the two. If they match, you have a valid download. Again, what is your question?
👍 59 | 👎 -14

Moreen Moreen
Don't understand your question. And md5 should never be used anymore anyway. It's very vulnerable to collisions. There are better algorithms available like SHA-2.
👍 58 | 👎 -22

Lissa Lissa
Have you not done a research about it via google.com? Check out these links, they are related. http://answers.yahoo.com/question/index?... http://answers.yahoo.com/question/index?... http://www.dshield.org/tools/reversehash...
👍 57 | 👎 -30

Lissa Originally Answered: Solve for x?
If the logs of two things are equal, then the things are equal. So in this case 2x-3 = 21 I guess you can solve this for yourself? [x = 12] PS Thanks Knowit A. Notice Actuary's error -- too many students get mixed up with this. The property is ln A - ln B = ln(A/B), NOT ln(A-B) = ln A / ln b. I've used this property in an example below. These could get a bit more interesting if you need to use the properties of logarithms. e.g. If you were given ln (x+2)(2x+5) = 0, you would have to know that 0 = ln 1, and so (x+2)(2x+5) = 1 and then you would remove parentheses and collect terms on the left to get 2x^2 + 9x + 9 = 0 which gives x = -3 or -3/2 Or if you were given ln (3x +1) - ln (x + 3) = ln 2, you would need to know the logarithm property that tells you that the left side is ln[(3x+1)/(x+3)], and then putting the expression inside the square brackets equal to 2, you could solve to find x = 5 etc. pps Those answerers who used exponentiation are correct, but it's using a high-level process unnecessarily where a simple principle applies, and indeed the high-level process depends on the simple principle: ln a = ln b implies that a = b.

If you have your own answer to the question computer algorithm and problem solving, then you can write your own version, using the form below for an extended answer.