What problems are your trying to solve? Knowing you have ADHD is useful because it offers insight into what solutions will work well. For example, it might offer suggestions as to what medications might produce useful results.
I want to have more focus and find it easier to do boring things.
I think I have ADHD. What should I do now?
Crickets at $38/pound dry weight are close to being competitive with salmon (more than 3 pounds needed to get the equivalent nutrition). Or $23/pound in Thailand (before high shipping fees), suggesting the cost in the U.S. will drop a bit as increased popularity causes more competition and economies of scale.
Could you breed crickets at home?
Let's make sure we're talking about cryptographic hashing functions.
Let's say I make a prediction that Barack Obama is a werewolf. I don't want anyone to know I've made this prediction, because otherwise the Secret Werewolf Police will come and eat me, but I do want to lord it over everyone after the fact.
I take the string "Barack Obama is a werewolf" and I put it through a hashing function, (for purposes of this example, the hashing function MD5). This produces the output 37ecb0a3164e6422bedc0f8db82e45ec. The original string about Barack Obama is not recoverable from this output, because MD5 is a lossy function, but anyone else putting that string through the MD5 hashing function will get the same output. The hash output is like a fingerprint for the original string.
So if I put 37ecb0a3164e6422bedc0f8db82e45ec in a public place a year before Barack Obama transforms into a werewolf on live television, after the fact I can give people the original string and they can verify it for themselves against the hash output.
I use a Chrome plugin for most tasks that involve basic encoding of text values. (If I'm honest, I mostly use it for rot13, and more exotic uses aren't that common). There are also online hash generators for different hashing functions. Some popular hashing functions for this purpose are MD5 and SHA1.
Does this answer your question?
You said you use this for ROT13ing things. How does that work? Suppose I wanted to make a Facebook post that gave my friends the option of knowing Obama is a werewolf, but also gave them the option for them not to know this if they'd rather be surprised later.
Let's make sure we're talking about cryptographic hashing functions.
Let's say I make a prediction that Barack Obama is a werewolf. I don't want anyone to know I've made this prediction, because otherwise the Secret Werewolf Police will come and eat me, but I do want to lord it over everyone after the fact.
I take the string "Barack Obama is a werewolf" and I put it through a hashing function, (for purposes of this example, the hashing function MD5). This produces the output 37ecb0a3164e6422bedc0f8db82e45ec. The original string about Barack Obama is not recoverable from this output, because MD5 is a lossy function, but anyone else putting that string through the MD5 hashing function will get the same output. The hash output is like a fingerprint for the original string.
So if I put 37ecb0a3164e6422bedc0f8db82e45ec in a public place a year before Barack Obama transforms into a werewolf on live television, after the fact I can give people the original string and they can verify it for themselves against the hash output.
I use a Chrome plugin for most tasks that involve basic encoding of text values. (If I'm honest, I mostly use it for rot13, and more exotic uses aren't that common). There are also online hash generators for different hashing functions. Some popular hashing functions for this purpose are MD5 and SHA1.
Does this answer your question?
You understood my question better than I did. Thank you.
Is the following paragraph correct?:
If I had unlimited computing power, I could search for all the inputs that return 37ecb0a3164e6422bedc0f8db82e45ec from the MD5 function. Then I could search those inputs and see which ones are meaningful sentences in English, and then make an educated guess at what the message is. But in reality, it would take too much computing power to find even a single string that returns 37ecb0a3164e6422bedc0f8db82e45ec.
How do I make a hash? In case I'm using the wrong word, I want to encrypt a message, then put the encrypted message in a public place, then decrypt the message in a way that proves that I actually encrypted a message (I didn't just write a nonsense string and later retcon an encryption scheme that makes it meaningful).
Saving this so I can read it after it gets deleted.
If wages are too high, causing unemployment, might it be better for employers to get more advantages while hiring?
Is there any way to block distracting software on my computer? There are a blue million apps that will block websites, but I can't find any that will stop me from playing games I've installed. Ideally, I'd like some software that lets me play my games, but only after a 10 minute wait. But I'd settle for anything now that can restrict my access to games without uninstalling them entirely.
View more: Next
Subscribe to RSS Feed
= f037147d6e6c911a85753b9abdedda8d)
Is it worth it to learn a second language for the cognitive benefits? I've seen a few puff pieces about how a second language can help your brain, but how solid is the research?