Reverse is probably the wrong word - more like you can match it. A simple bruit force attack on a md5 hash will allow you to find a matching reversal. Given that these strings are salted you've got a slightly better chance of the match not being your actual password though.
An example of this being used would be in the large rainbow tables that have billions of records. These often contain a lot of passwords and the matching hashes. Obviously it's a lot less likely that their database of hashes/matches will contain password+salt however.
A lot of the MD5 tables have a 99.9% success rate - if you take a look here, you'll see them all available for public download:
http://project-rainbowcrack.com/table.htm
Some online sites use these lists along with their own, and when you enter a hash will first check if its already been matched, and if it hasn't it adds it to the queue for matching.
I started trying to reverse the one I listed in my post yesterday (6ff01f01a2b090ce34acf1fbc28d04cd) at cmd5.org and it's currently showing as 11% complete - bearing in mind that's likely running multiple hash matches at once, and its only been about 6 hours. It'll have a match within 48 hours. It'll be interesting to see if it actually gets the 'real' password as a match, or a random string.
----------
DOB's are stored along with your basic user details - so yes. They'll have:
- DOB
- Email
- Hashed/Salted password
- Salt string
- IP / Hostname
- etc
Basically anything in your user profile - they have now got.
----------
Ditto - it's got to have been a crap 24 hours for Arn. Good luck in sorting it all out.