coja to Programmer [email protected] • 1 year agoFind yourselflemmy.mlimagemessage-square99fedilinkarrow-up1620arrow-down128
arrow-up1592arrow-down1imageFind yourselflemmy.mlcoja to Programmer [email protected] • 1 year agomessage-square99fedilink
minus-square@Snazzlink24•1 year agoBit hacker 2 is really fascinating. It uses a bit mask of all 1s (-1) or all 0s (0) and takes advantage of the fact that y ^ (x ^ y) = x and y ^ 0 = y
Bit hacker 2 is really fascinating. It uses a bit mask of all 1s (-1) or all 0s (0) and takes advantage of the fact that y ^ (x ^ y) = x and y ^ 0 = y