- #1
You can see it by logging out, getting the image and then logging back in. Once you have gotten the image, you don't need to log out again to see it again (probably because it is cached locally).davee123 said:I think you may have to post an external link to the image-- for whatever reason attached images still don't work in the Brain Teasers forum!
DaveE
neutrino said:Thanks, ddc, you saved us some time. :-)
sanx, should the solver be endowed with the knowledge of reading sheet music to find the hidden code?
davee123 said:The notes are all 1/4 notes
DaveE
moose said:1/8 notes...
C D E F G A B C D E F G A B C D E F G A B C D E F G A B C
C
B
B
B
F
B
B
B
----------------------------------------------------------
C
E
F
B
E
B
D
G
----------------------------------------------------------
E
C
D
G
E
D
F
A
----------------------------------------------------------
E
A
E
E
==========================================================
B
G
C
A
D
B
F
B
----------------------------------------------------------
G
C
B
B
C
F
F
B
----------------------------------------------------------
A
G
A
E
C
F
C
E
----------------------------------------------------------
F
B
B
A
A
A
C
D
----------------------------------------------------------
A
D
==========================================================
C
B
A
A
C
E
----------------------------------------------------------
C
E
F
D
D
B
----------------------------------------------------------
C
A
G
E
C
D
----------------------------------------------------------
"Hidden code" refers to any type of code or programming that is intentionally written in a way that is not easily visible or understandable. This can be used for security purposes, to protect intellectual property, or to simply make the code more efficient.
Hidden code can be used for a variety of purposes, such as encryption, obfuscation, and steganography. It can also be used in software development to improve performance and protect proprietary algorithms.
The main benefit of using hidden code is increased security. By making the code more difficult to understand, it can be harder for hackers to exploit vulnerabilities. Additionally, hidden code can also improve efficiency and protect intellectual property.
One potential drawback of hidden code is that it can be more difficult to debug and maintain, especially for other programmers who are not familiar with the code. Additionally, using hidden code can also make it more difficult for software to be updated or modified.
There are various methods that can be used to detect and decipher hidden code, such as reverse engineering, code analysis tools, and specialized software. However, some methods may be more complex and time-consuming, depending on the level of obfuscation used in the code.