When I write software, every line of code is accompanied by the thought "I'm a blackhat hacker, with execution thread. How do I leverage this line of code?"
When I write software, every line of code is accompanied by the thought "I'm a blackhat hacker, with execution thread. How do I leverage this line of code?"