Challenge Write a program or function that converts a 32 bit binary number to its quad-dotted decimal notation (often used for representing IPv4) Quad-dotted decimal A quad-dotted decimal is formed like so: Split the binary representation into its 4 individual bytes Convert each byte into denary place "." between each number Example: input: 10001011111100010111110001111110 step 1: 10001011 11110001 01111100 01111110 step 2: 139 241 124 126 step 3: 139.241.124.126 I/O examples input --> output...| Recent Questions - Code Golf Stack Exchange
For any positive 32-bit integer (1 ≤ n ≤ 0xFFFFFFFF) output the number of bits needed to represent that integer. Test cases | n | n in binary | bits needed | |----------------------------------| | 1 | 1 | 1 | | 2 | 10 | 2 | | 3 | 11 | 2 | | 4 | 100 | 3 | | 7 | 111 | 3 | | 8 | 1000 | 4 | | 15 | 1111 | 4 | | 16 | 10000 | 5 | | 128 | 10000000 | 8 | | 341 | 101010101 | 9 | 4294967295 => 11111111111111111111111111111111 => 32 So f(16) would print or return 5 This is code-golf. Shortest code in...| Recent Questions - Code Golf Stack Exchange
The Gray Code is a sequence of binary numbers of bitwidth n where successive numbers differ only in one bit (see example output). Reference Example input: 3 Example output: 000 001 011 010 110 111 101 100 Notes: This question seems to have a dupe but it's not, for that question is not a code-golf, and it demands different output. It will help to check out it's answers, though. You may assume a variable n which contains the input.| Recent Questions - Code Golf Stack Exchange
inspired by Count down from infinity Given a non-negative integer N, output the number of repetitions of the following steps it takes to reach 0: Convert N to binary (4812390 -> 10010010110111001100110) Flip each bit (10010010110111001100110 -> 01101101001000110011001) Trim leading zeroes (01101101001000110011001 -> 1101101001000110011001) Convert back to decimal (1101101001000110011001 -> 3576217) Rules Input and output may be in any unambiguous, consistent format The input will be within th...| Recent Questions - Code Golf Stack Exchange
PagePerfect: the Promise of Desktop Publishing Realized| Obsolete Thor
Swift makes it relatively easy to format numbers as byte counts, with appropriate suffixes to indicate units and generally sensible auto-selection of scale factors. e.g.: 1 kB (in English – results may vary depending on locale) This is just a small subset of Swift’s FormatStyle-based formatting capabilities, with which I have a bit of a… Read more| Wade Tregaskis
I recently was able to image a few Bernoulli Disks for a collection using a SCSI device I have found quite useful. The disks had been sitting around for quite some time waiting for the right tools and resources to extract the contents. I mentioned the accomplishment to a few coworkers and one asked me if I would extract the contents from their old disk they used for school back in the 1990’s. They had spent a whopping $99 at the local bookstore for a disk which held a total of 150MB. Not GB...| Obsolete Thor
Ever wondered how a program executable file are loaded by the operating system, despite these files| My Reality Blog
This blog post will give an overview of a static bitsequence data structure known as RRR, which answers arbitrary length rank queries in $\mathcal{O}(1)$ time, and provides implicit compression. As my blog is informal, I give an introduction to this structure from a birds eye view. If you| alexbowe.com
I’ve been keeping an eye on the search terms that land people at my site, and although I get the occasional “alex bowe: fact or fiction” and “alex bowe bad ass phd student” queries (the frequency strangely increased when I mentioned this on Twitter| alexbowe.com
Did God make Adam male and female? How many genders did God create? Is having many genders part of God's plan?| Christian Apologetics
In this tutorial, you will learn how to use static analysis to check for backdoors in the OpenWRT firmware binary.| tbhaxor's Blog
Introducing the fix-stomped-imports Binary Ninja plugin, allowing you to reconstruct a stomped Import Address Table when reverse engineering.| LRQA Nettitude Labs
How to use Ghidra's Version Tracking to avoid reverse engineering binaries from scratch when a new software version is released.| LRQA Nettitude Labs
In this deep dive, you'll learn about the Unicode character set and how it's encoded and decoded with UTF.| www.aleksandrhovhannisyan.com
As a maintainer of the free and open source software project Apache Commons, I review pull requests on GitHub. Since the libraries we produce in components like Commons Lang, Commons IO, and Commons VFS are used directly and transitively in countless applications, open and closed source alike, we want to be careful when releasing new […]| Gary Gregory
A walkthrough of how to use the Qiling framework to emulate a HTTP server binary from the NEXXT Polaris 150 travel router.| LRQA Nettitude Labs
Deploying Nim applications as static binaries for GNU/Linux type| A Scripter's Notes
Shell script snippets to check if you have an executable or binary| A Scripter's Notes
Subnetting – it’s the subject that IT professionals love to hate. Believe it or not, the frustration that it caused me as a student years ago made me question whether I wanted to go into the information technology (IT) field. Furthermore, with the availability of many subnet calculator programs and subnetting websites, the ability to … … Continue reading →| Doug Vitale Tech Blog
Linked List You are given a linked list and a value k. Write a script to partition the linked list such that all nodes less than k come before nodes greater than or equal to k. Make sure you...| E. Choroba
"There is no day that I do not think about my gender expression and the implications of actively dismantling the gender binary."| Women Across Frontiers Magazine
There was a story on Slashdot last weekend about a cipher invented in 1918: the Chaocipher. In summary: John F. Byrne invented a two wheel enciphering device. He tried, unsuccessfully, to sell the…| my 20%
Hello dear interwebs,| KaKaRoTo's Blog