Search found 7 matches
- Thu Dec 29, 2011 10:43 pm
- Forum: Challenges Solved
- Topic: Protected Password 3
- Replies: 7
- Views: 2676
- Sat Dec 24, 2011 4:49 am
- Forum: Challenges Solved
- Topic: HVM Cipher
- Replies: 10
- Views: 3237
I just analyze the code a litttle bit, and the divide the output into groups with 6 number in a group, like this: 2632 2718 2662 2937 557 3026 2968 3003 549 2936 2706 2726 2732 562 2941 2690 2706 2984 569 3005 2710 2937 2713 2738 2963 562 2957 2685 2706 577 2732 2711 2998 529 2718 2985 2976 2711 294...
- Fri Dec 23, 2011 8:11 pm
- Forum: Challenges Solved
- Topic: Blood, Toil, Tears and Sweat
- Replies: 9
- Views: 1006
- Fri Dec 23, 2011 6:13 pm
- Forum: Challenges Solved
- Topic: Be Ye Men of Valour
- Replies: 6
- Views: 961
Not a very hard cipher, indeed. Every step is quite obvious. I wonder why so few people solved it. And also, I suggest to change the answer to a string that is not an English word. Otherwise solvers don't even need to work on the transposition cipher part. They only need to find what is the appended...
- Wed Dec 14, 2011 7:33 pm
- Forum: Challenges Solved
- Topic: Super Small Quine
- Replies: 13
- Views: 1326
mine: 0@s!@ @@@ @ 01^gP1+$ And, it seems that printing some more \0 will result in 'incorrect', but the return message will not contain those \0 in the tail. So I gets something like: <font color=red>Expected: '0@s!@@@@@@ x01vgP1+$', got: '0@s!@@@@@@ x01vgP1+$'</font><br> Your King of the Hill score...
- Sat Dec 10, 2011 5:58 pm
- Forum: Challenges Solved
- Topic: belong to us
- Replies: 10
- Views: 1278
Very interesting challenge. At first I do some fixing work for the obscured decompile code to make it clearer. And then I suddenly realize ( actually, guess ) that a(String, String, boolean) is a HVM interpreter when I see the long ( and broken ) switch list. Luckily this is correct. By the way, HVM...
- Tue Sep 07, 2010 9:49 am
- Forum: Challenges Solved
- Topic: Immortal
- Replies: 15
- Views: 3331