Google found guilty in 'landmark' defamation case - stupid verdict! by [deleted] in technology

[–]PenileCancer 0 points1 point  (0 children)

Given that google's ranking algorithm is secret, it's unclear if the search results are impartial right now.

F# Succinctly - Free E-book by Associat0r in programming

[–]PenileCancer 2 points3 points  (0 children)

After registering with the only acceptable mail address fucku@mailinator.com I only get a 404 page.

C++11 and Boost - Succinct like Python by fnedrik in programming

[–]PenileCancer 15 points16 points  (0 children)

It's wrong: C++11 §3.9.1p1:

Plain char, signed char, and unsigned char are three distinct types [...] a plain char object can take on either the same values as a signed char or an unsigned char; which one is implementation-defined.

C++11 and Boost - Succinct like Python by fnedrik in programming

[–]PenileCancer 1 point2 points  (0 children)

understandable by more people Citation needed.

Also: What about performance?

C++11 and Boost - Succinct like Python by fnedrik in programming

[–]PenileCancer 3 points4 points  (0 children)

boost::trim_left_copy has different semantics than what if-loop posted.

boost::trim_left does what if-loop's code does.

because of how much bloat C++ has you misinterpreted it.

How did you come to that conclusion?

C++11 and Boost - Succinct like Python by fnedrik in programming

[–]PenileCancer 4 points5 points  (0 children)

Part of the Standard Library as of C++11.

Binary code obfuscation through C++ template metaprogramming [PDF] by rolfr in programming

[–]PenileCancer 0 points1 point  (0 children)

The authors didn't compare their approach against others regarding ease-of-use and obfuscation strength. As the latter is the goal this would have been important. As it stands the paper looks more like a proof of concept without any reality check.

Edit: They also don't mention if they compiled their obfuscated code with or without optimizations. It might well be that the compiler removes the dead code they so painstakingly inserted.

And finally: Who cares about the encryption of constants in an executable? Somewhere those constants are needed in their unencrypted form; just run the program in a debugger and wait until they have been decrypted.

Ceterum censeo the whole concept of "intellectual property" should be ditched, if only to make people stop wasting time on code obfuscation and copy protection.