Hacker Newsnew | past | comments | ask | show | jobs | submit | Cold_Miserable's commentslogin

I see what you're doing. 13 bytes, 3 cycles. Why does newline not work?

lzcnt ecx,ecx

mov eax, 00100 0011 0010 0000 0001b shl ecx,2 shrx eax,eax,ecx and eax,15


I can't see any elegant solution. \n

Struggling proc \n lzcnt ecx,ecx \n test cl,cl \n setz al \n lea edx,[ecx-2] ;[0,1,2] \n cmp rdx,2 \n cmovle eax,ecx \n ret \n Struggling endp


I have low pitch rumbling in my right ear. MRI was useless. Hearing test "perfect". Its hard to sleep without background noise. I think its a damaged blood vessel in my brain or neck: veinous stenosis.

It could well be that. An MRA and MRV could confirm or rule out those suspicions. If the damaged vessel can be found, it might be treatable by stenting.

Check out whooshers (dot com) or /r/pulsatiletinnitus for two supportive communities with some good advice.


The UK is going downhill. Economically and politically. Use of government thugs "police" to intimidate is just the beginning. Home invasion child rapists were given less time than Lucy Connelly, Alex Bellfield or Tommy Robinson got for hurty words.


Alex Bellfield and Tommy Robinson did a lot more than “hurty words” and I think you know that.


Tommy Robinson indeed went to prison for slander. I’m not sure what else you have in mind.


Maybe this:

"In 2021 he was found to have libelled a 15-year-old refugee at a school in Huddersfield and was ordered to pay £100,000 plus legal costs. After breaching an injunction about repeating the libel, Robinson was sentenced to 18 months in prison for contempt of court in October 2024"

Also:

"Robinson's criminal record includes convictions for violence, financial, and immigration frauds, cocaine possession with intent to supply, and public order offences.[135][136][137] He had previously served at least three separate custodial sentences: in 2005 for assault, in 2012 for using false travel documents and in 2014 for mortgage fraud."


Prison for libel then.


No. Prison for contempt of court. He lost a civil case related to the libel and was ordered to pay the victim and not repeat the libel (by showing his film). He decided to show his film at a rally, and the court deemed this contempt and sentenced him to prison.

However you frame it, that’s not “prison for libel”. That’s prison for contempt of court. He was ordered not to do a thing. He decided to do the thing. So the court sent him to prison.


...and the thing the court ordered him to do was to not libel.

Really if there is any part you should disagree with it's "Home invasion child rapists were given less time"


Worst case scenario for random access is a multiple level TLB miss, a memory refresh cycle and then a system management mode interrupt all occurring consecutively.


From the "analysis" I gather it works by encrypting the .exe and the key's are server-side. The hardware info is used to further encrypt it.

I think the goal should be to fool the checks rather than remove the encryption which would be a nightmare. CPUID can output whatever you want, it just reads MSR's. I'm sure there are possibilities to use kernel drivers to make windows functions also read out whatever you want.


You need (1) a valid license file and (2) a list of all the checks that are made and (3) some way to override the output of each check. Furthermore, you want to ideally do this in a way that makes your cracked software actually deployable on random computers, so you don’t want to do any heavy kernel-mode hooking because people won’t be able to use your crack.

Oh and if you actually do distribute a crack that uses a stolen license file, they’ll ban the heck out of the hardware identified in the license (and probably any user/account/Steam IDs they manage to hoover up), which will no doubt be an annoyance to a cracker.


The UK is a poor country with a money laundering capital tacked-on.


mov eax,64 lzcnt r8,rcx sub eax,r8d imul eax,1233 shr eax,12

Accurate to within 1.


This is ~9.6x faster than "scalar".

ASM_TestDiv proc ;rcx out, rdx A, r8 B mov rax,05555555555555555H kmovq k1,rax vmovdqu8 zmm0,zmmword ptr [rdx] vmovdqu8 zmm4,zmmword ptr [r8] vpbroadcastw zmm3,word ptr [FLOAT16_F8] vmovdqu8 zmm2{k1},zmm0 ;lower 8-bit vmovdqu8 zmm16{k1},zmm4 ;lower 8-bit vpsrlw zmm1,zmm0,8 ;higher 8-bit vpsrlw zmm5,zmm4,8 ;higher 8-bit vpord zmm1,zmm1,zmm3 vpord zmm2,zmm2,zmm3 vpord zmm5,zmm5,zmm3 vpord zmm16,zmm16,zmm3 vsubph zmm1,zmm1,zmm3{rd-sae} ;fast conv 16FP vsubph zmm2,zmm2,zmm3{rd-sae} vsubph zmm5,zmm5,zmm3{ru-sae} vsubph zmm16,zmm16,zmm3{ru-sae} vrcpph zmm5,zmm5 vrcpph zmm16,zmm16 vfmadd213ph zmm1,zmm5,zmm3{rd-sae} vfmadd213ph zmm2,zmm16,zmm3{rd-sae} vxorpd zmm1,zmm1,zmm3 vxorpd zmm2,zmm2,zmm3 vpsllw zmm1,zmm1,8 vpord zmm1,zmm1,zmm2 vmovdqu8 zmmword ptr [rcx],zmm1 ;16 8-bit unsigned int ret


Heh? Surely fast convert 8-bit int to 16-bit FP,rcp+mul/div is a no-brainer? edit make that fast convert,rcp,fma (float 16 constant 1.0) and xor (same constant)


Unfortunately none of the hardware used for testing supports FP16 arithmetic. Between Intel and AMD, the only platform that supports AVX512-FP16 is currently Sapphire Rapids.


Alderlake supports AVX512-FP16. Still only 9.6x faster than div. Most likely reciprocal is just too slow.


I tried a similar approach with 32-bit FP before, and the problem here is that fast conversion is only fast in the sense of latency. Throughput-wise, it takes 2 uops instead of one, so in the end, a plain float<->int conversion wins.


Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: