![]() |
Can you crack the secret code in U.S. Cyber Command's logo
The newly formed U.S. Cyber Command is supposed to centralize and focus the military's ability to wage war over the Internet, but so far it's basically famous for brainteasers. The command's fancy logo contains a super-secret code in its inner gold ring: 9ec4c12949a4f31474f299058ce2b22a. Though some people noticed the code late last month, Wired's Threat Level Danger Room blog picked it up Wednesday morning and announced a contest, with a free T-shirt (or a ticket to the International Spy Museum) going to the first reader to crack the code.
9ec4c12949a4f31474f299058ce2b22a http://news.yahoo.com/s/yblog_upshot...-commands-logo http://l.yimg.com/a/p/us/news/editor...d9b897612.jpeg |
nevermind I'm not really sure what's going on anymore.
|
Quote:
the code print as "fuckoff-motherfucker-USA-Hurray!". . |
USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.
|
Can decrypt it here yourself http://www.md5decrypter.com/
|
"Thy affiliate shall promotith the dating gold on all yee sites and thy shall prosper."
|
Quote:
|
Quote:
|
that's kinda neat.
|
Quote:
|
:1orglaugh:1orglaugh
|
I can't even figure out what the lightning bolt and key are supposed to mean
|
Quote:
|
and what is that good for? prevention against secretaries and mommies? :)
|
Quote:
|
Quote:
Did you read the article? http://news.yahoo.com/s/yblog_upshot...-commands-logo We tried encrypting that entire statement using an MD5 hash generator, and we didn't get a match to the logo code. So it looks like just a portion of the statement has been encoded. Eventually someone will figure out which portion, and win a T-shirt |
The journalists in the article tried to hash the wrong mission statement.
They used the mission statement found on the official source. Since the source is a military intelligence agency, the military hackers changed their mission statement to confuse people, and maybe for a good laugh. Or for the sake of creating some publicity :winkwink: http://www.stratcom.mil/factsheets/cc/ Quote:
This gives you the MD5 hash ac244cda9fa3ab16a2a51dc4f16b1547. If you remove the extra comma you will get Quote:
Voila. Mystery solved. :upsidedow |
"All your base are belong to us"
|
I love a good mystery.
|
Quote:
Well done Zyber. By name by nature. Zyber = cypher |
I hope they come up with something better then an MD5 hash really soon.
|
Quote:
|
cam_girls, thanks. However, the story of my name nickname is a bit different :)
2012, you could take a look at SHA-256 or SHA-512 instead of MD5. Or wait till 2012 (pun intented), when SHA-3 is scheduled to be released. http://en.wikipedia.org/wiki/Secure_Hash_Algorithm |
The SHA-256 and SHA-512 are available as of PHP5.
http://www.php.net/manual/en/function.hash.php |
Quote:
|
not all that interesting
|
............
|
USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.
|
All times are GMT -7. The time now is 03:07 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123