Feeds

Boffin brainteaser book bonanza

Physicus comp too easy? Then analyse this!

  • alert
  • submit to reddit

Inspired by the impressive response to our Physicus competition, Reg Merchandising got straight on the blower to publisher Fourth Estate to secure 20 copies of The Code Book a bestseller and a very good read, to boot.

Aficionados of the Enigma code and other such pieces of linguistic skullduggery will doubtless enjoy Simon Singh's fine essay on ciphers in their many and glorious forms.

To win a copy, budding Alan Turings need simply to decipher the following text,encoded by our very own crypto-hackette, Lucy Sherriff:

qfoukwucpujlukfdsjfdoujoswubepswsbipnqnjqfou
ksdlnepsaipuoujosdqfzwuobsqubqsjfdnbbukobsqf
kfhjubskhflskcfjwnkofkwuyshsbnudbsbpomswshsk
sblfkyshfdswfkwuwubtndhsdfofdksdejuuducneskp
ofjhslsosjcukngujfujsdopsljfgpdsbukxlpqfipuk
popchnjopsdwfbskukljubbskobsqsdjuyfduksbseps
ejnkopsdwfbfkujsbukkpudsdqujfdnoskwusbmubnqf
oukwucpujlukfdsjfdoujoswubepswsbipnqnj

The rules are pretty simple. The answer must be in English and received by 5.00pm GMT on Friday 17th November. E-mail you entries to us
here.

The first 20 correct solutions out of the hat will get the goods. As an incentive, we'll send some Reg kit to the first correct answer we receive. Good luck as ever. ®

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.