coja to Programmer [email protected] • 8 months agoFind yourselflemmy.mlimagemessage-square108fedilinkarrow-up1659arrow-down129
arrow-up1630arrow-down1imageFind yourselflemmy.mlcoja to Programmer [email protected] • 8 months agomessage-square108fedilink
minus-square@[email protected]linkfedilink24•8 months agoBit hacker 2 is really fascinating. It uses a bit mask of all 1s (-1) or all 0s (0) and takes advantage of the fact that y ^ (x ^ y) = x and y ^ 0 = y
Bit hacker 2 is really fascinating. It uses a bit mask of all 1s (-1) or all 0s (0) and takes advantage of the fact that y ^ (x ^ y) = x and y ^ 0 = y