Look carefully at the first line. Now try to figure out how this JAPH is encoded; when you do you'll be scared : ) And for those who can't find out, just click the readmore tag.
die unless print keys %j and open uc sqrt hex chr lstat; @_[0..100]=grep{!/[qyixd;%]/}split//,~~<0>;$\=$/;print substr join( $&,map{$$_[$[]}sort{z($$a[1])<=>z($$b[1])}map{[$_[$_],$_]}0..46),23; sub z {@h[18,28,6,12,13,20,3,23,33,35,0,10,1,9,5,32,4,8,39,45,29,14,15 +,40]= (1+\\///\\\//..$=);$h[pop];}
The 15 year old, freshman programmer,
Stephen Rawls
Well, the first line opens the script, but it also does something else. Look at each of the functions on the first line. Notice that they have the individual characters of "just another perl hacker" spread among them. This is how I generate the JAPH. So the thing that will blow you away is that the very line used to open the encoded message is infact the encoded message. It took me a many searches of man perlfunc to find functions with the right letters.
|
---|
Replies are listed 'Best First'. | |
---|---|
Re: Encoding wonders
by earthboundmisfit (Chaplain) on Jun 12, 2001 at 17:38 UTC | |
by earthboundmisfit (Chaplain) on Jun 13, 2001 at 14:57 UTC | |
Re: Encoding wonders
by virtualsue (Vicar) on Jun 13, 2001 at 01:16 UTC | |
by srawls (Friar) on Jun 13, 2001 at 04:52 UTC | |
by dimmesdale (Friar) on Jun 14, 2001 at 21:49 UTC | |
by virtualsue (Vicar) on Jun 17, 2001 at 02:27 UTC | |
by John M. Dlugosz (Monsignor) on Jun 15, 2001 at 00:47 UTC | |
by dimmesdale (Friar) on Jun 15, 2001 at 03:58 UTC | |
|
Back to
Obfuscated Code