Serious Security: Understanding how computers count

shape
shape
shape
shape
shape
shape
shape
shape