coja to Programmer [email protected] • 2 years agoFind yourselflemmy.mlimagemessage-square104fedilinkarrow-up1641
arrow-up1641imageFind yourselflemmy.mlcoja to Programmer [email protected] • 2 years agomessage-square104fedilink
minus-square@[email protected]linkfedilink23•2 years agoBit hacker 2 is really fascinating. It uses a bit mask of all 1s (-1) or all 0s (0) and takes advantage of the fact that y ^ (x ^ y) = x and y ^ 0 = y
Bit hacker 2 is really fascinating. It uses a bit mask of all 1s (-1) or all 0s (0) and takes advantage of the fact that y ^ (x ^ y) = x and y ^ 0 = y