I don't understand all this paranoia on this forum. I have already explained it in other thread.... All passwords are Hashed.
Reversing MD5 hash is not really possible, as
1 - there caan be more than one string giving the same MD5
2 - it was designed to be hard to "reverse"
The goal of the MD5 and its family of hashing functions is
- to get short "extracts" from long string
- to make it hard to guess where they come from
- to make it hard to find collisions, that is other words having the same hash (which is a very similar exigence as the second one)
Think that you can get the MD5 of any string, even very long... And the MD5 is only 16 bytes long (32 if you write it in hexa to store or distribute it more easily). If you could reverse them, you'd have a magical compacting scheme.
This being said, as there aren't so many short strings (passwords...) used in the world, you can test them from a dictionary (that's called "brute force attack") or even google for your MD5. If the word is common and wasn't salted, you have a reasonable chance to succeed with rainbow tables.
Even if the hacker dumps the whole database, and, unless your password is hellokitty and it's md5 can be found on google, you're safe. Salting or not is not the question.
Passwords like M4cRumor$ ( with capital,alpha-numeric and symbols ) can never be cracked unless you have enough time; by that I mean > 80,000 years