These are just one-way capabilities – Meaning that it's unfeasible to make use of the hash value to figure out what the first input was (with current technology and procedures). Now, let's go forward to applying MD5 in code. Be aware that for functional applications, it is recommended to utilize https://sergiocimrt.theisblog.com/33761717/getting-my-what-is-md5-technology-to-work