Forumwarz is the first "Massively Single-Player" online RPG completely built around Internet culture.

You are currently looking at Flamebate, our community forums. Players can discuss the game here, strategize, and role play as their characters.

You need to be logged in to post and to see the uncensored versions of these forums.

Log in or Learn about Forumwarz

Role Playing
Switch to Civil Discussion Role-Playing
Gay HAT

Sheedkip

Avatar: Code (Blue)
2

[Bonkenhi Boards VI]

Level 35 Hacker

“43 4f 44 45 20 4d 41 53 54 45 52”

For higher level hackers, what’s the significance of the ASCII binary code tagline that translates to HAT ? Is it to represent black/white hat hackers, or is it a plot against the Mexicans? Thanks.

Sheedkip Posted:

For higher level hackers, what’s the significance of the ASCII binary code tagline that translates to HAT ? Is it to represent black/white hat hackers, or is it a plot against the Mexicans? Thanks.


I'M A SIG-DISABLING COCKMONGLER

Sheedkip Posted:

Log in to see images!

Log in to see images!

Log in to see images!

Log in to see images!

Log in to see images!

Log in to see images!

Log in to see images!


Log in to see images!

OMG mammary glands

Log in to see images!

what the **** is this shi- ALL GLORY TO THE HYPNOTOAD

In Spite Of

Avatar: 23493 2011-10-31 20:46:14 -0400
26

[And The Banned Pla-
yed On
]

Level 60 Emo Kid

The Delightfully Chaotic

Sheedkip Posted:

For higher level hackers, what’s the significance of the ASCII binary code tagline that translates to HAT ? Is it to represent black/white hat hackers, or is it a plot against the Mexicans? Thanks.

01010100 01101000 01100101 00100000 01001000 01000001 01010100 00100000 01101101 01100101 01100001
01101110 01110011 00100000 00110110 00110101 00100000 00110111 00111000 00100000 00110110 00110001
00100000 00110110 00110011 00100000 00110111 00110100 00100000 00110110 01100011 00100000 00110111
00111001 00100000 00110010 00110000 00100000 00110111 00110111 00100000 00110110 00111000 00100000
00110110 00110001 00100000 00110111 00110100 00100000 00110010 00110000 00100000 00110110 00111001
00100000 00110111 00110100 00100000 00110010 00110000 00100000 00110110 00110001 00100000 00110111
00110000 00100000 00110111 00110000 00100000 00110110 00110101 00100000 00110110 00110001 00100000
00110111 00110010 00100000 00110111 00110011 00100000 00110010 00110000 00100000 00110111 00110100
00100000 00110110 01100110 00100000 00110010 00110000 00100000 00110110 01100100 00100000 00110110
00110101 00100000 00110110 00110001 00100000 00110110 01100101 00100000 00110010 00110000 00100000
00110111 00110100 00100000 00110110 00111000 00100000 00110110 00110001 00100000 00110111 00110100
00100000 00110010 00110000 00100000 00110011 00110111 00100000 00110011 00110011 00100000 00110010
00110000 00100000 00110011 00110011 00100000 00110011 00110010 00100000 00110010 00110000 00100000
00110011 00110001 00100000 00110011 00110000 00100000 00110011 00110010 00100000 00110010 00110000
00100000 00110011 00110001 00100000 00110011 00110001 00100000 00110011 00110111 00100000 00110010
00110000 00100000 00110011 00111001 00100000 00110011 00111001 00100000 00110010 00110000 00100000
00110011 00110001 00100000 00110011 00110000 00100000 00110011 00110111 00100000 00110010 00110000
00100000 00110011 00110001 00100000 00110011 00110000 00100000 00110011 00110001 00100000 00110010
00110000 00100000 00110011 00110001 00100000 00110011 00110000 00100000 00110011 00110000 00100000
00110010 00110000 00100000 00110011 00110011 00100000 00110011 00110010 00100000 00110010 00110000
00100000 00110011 00110001 00100000 00110011 00110010 00100000 00110011 00110001 00100000 00110010
00110000 00100000 00110011 00110001 00100000 00110011 00110001 00100000 00110011 00110001 00100000
00110010 00110000 00100000 00110011 00110001 00100000 00110011 00110001 00100000 00110011 00110111
00100000 00110010 00110000 00100000 00110011 00110001 00100000 00110011 00110001 00100000 00110011
00110100 00100000 00110010 00110000 00100000 00110011 00110011 00100000 00110011 00110010 00100000
00110010 00110000 00100000 00110011 00110001 00100000 00110011 00110000 00100000 00110011 00111001
00100000 00110010 00110000 00100000 00110011 00110001 00100000 00110011 00110001 00100000 00110011
00110001 00100000 00110010 00110000 00100000 00110011 00110001 00100000 00110011 00110001 00100000
00110011 00110110 00100000 00110010 00110000 00100000 00110011 00110001 00100000 00110011 00110000
00100000 00110011 00110100 00100000 00110010 00110000 00100000 00110011 00110001 00100000 00110011
00110000 00100000 00110011 00110001 00100000 00110010 00110000 00100000 00110011 00110001 00100000
00110011 00110001 00100000 00110011 00110100

In Spite Of edited this message on 08/04/2009 8:46AM

quantumenergy

Avatar: Abstract Blue Circle
43

[Everyday Regular N-
ormal Klan
]

Level 69 Hacker

“Trojan Horse Magnum”

handofg0d Posted:

Quantum cryptography, or quantum key distribution (QKD), uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages.

An important and unique property of quantum cryptography is the ability of the two communicating users to detect the presence of any third party trying to gain knowledge of the key. This results from a fundamental aspect of quantum mechanics: the process of measuring a quantum system in general disturbs the system. A third party trying to eavesdrop on the key must in some way measure it, thus introducing detectable anomalies. By using quantum superpositions or quantum entanglement and transmitting information in quantum states, a communication system can be implemented which detects eavesdropping. If the level of eavesdropping is below a certain threshold a key can be produced that is guaranteed to be secure (i.e. the eavesdropper has no information about), otherwise no secure key is possible and communication is aborted.

The security of quantum cryptography relies on the foundations of quantum mechanics, in contrast to traditional public key cryptography which relies on the computational difficulty of certain mathematical functions, and cannot provide any indication of eavesdropping or guarantee of key security.

Quantum cryptography is only used to produce and distribute a key, not to transmit any message data. This key can then be used with any chosen encryption algorithm to encrypt (and decrypt) a message, which can then be transmitted over a standard communication channel. The algorithm most commonly bumociated with QKD is the one-time pad, as it is provably secure when used with a secret, random key.[1]

Internet Delay Chat
Have fun playing!
To chat with other players, you must Join Forumwarz or Log In now!