coja to Programmer [email protected] • 1 year agoFind yourselflemmy.mlimagemessage-square102fedilinkarrow-up1648arrow-down129
arrow-up1619arrow-down1imageFind yourselflemmy.mlcoja to Programmer [email protected] • 1 year agomessage-square102fedilink
minus-square@[email protected]linkfedilink24•1 year agoBit hacker 2 is really fascinating. It uses a bit mask of all 1s (-1) or all 0s (0) and takes advantage of the fact that y ^ (x ^ y) = x and y ^ 0 = y
Bit hacker 2 is really fascinating. It uses a bit mask of all 1s (-1) or all 0s (0) and takes advantage of the fact that y ^ (x ^ y) = x and y ^ 0 = y