Look at all the cryptic colors.. If you look really hard, you might start to see doubles... [300]
The emerging threats to information security are increasing at an alarming rate. The most influential and universal approach to counter such threats is encryption. Traditional encryption techniques use substitution and transposition. Substitution techniques map plaintext into ciphertext. In all traditional substitution techniques, characters, numbers and special symbols are substituted with other characters, numbers and special symbols.
Why can't an asterisk just be an asterisk? Why does it have to mean anything??? [250]
Woah, that's quite the traffic there... Someone better look for some Answers... [325]
This puzzle requires the included file. There is no puzzle page associated with this challenge. BTW, all zip passwords are "artofcodes"
Why do we feel it's necessary to yak about bulls**t in order to be comfortable? [400]
"The lines. They're all... diagonal!" Anyways... who doesn't love a good bunch of lines. [200]
"There should be no such thing as boring mathematics." So let's hear those theories! [200]
© Copyright 2020