Introduction Once I needed to create secured channel between my server and my application. As I remember, Boost.Asio could work with secured channels using OpenSSL. I tried to search information...
This article has been moved to: https://cybermaterial.com/chromecast-stops-casting-after-a-few-seconds/
This Article has been moved to: https://cybermaterial.com/solved-adobe-after-effects-error-zanzibar-crash-in-progress/
Details Event Plan : 6h30 - 7h00 : Effective Networking - Pizza and Beer 7h00 - 7h45 : "Discovering 3D Printing as the next trillion-dollar technology" by Charlie Maddock (Director of Business...
When discussing technological trends - particularly those of 2018 - it is almost impossible to leave out the significance that virtual and augmented reality have had. Most certainly, the...
1. Probabilistic Programming and Bayesian Methods for Hackers Bayesian Methods for Hackers illuminates Bayesian inference through probabilistic programming with the powerful PyMC language and the closely related Python tools NumPy,...
This article has been moved to: https://cybermaterial.com/metasploit-cheat-sheet/
This article has been moved to: https://cybermaterial.com/install-tor-browser-on-linux-ubuntu-centos/
This article has been moved to: https://cybermaterial.com/update-nginx-to-any-new-version-ubuntu-server-18-04/
This article has been moved to: https://cybermaterial.com/install-codec-error-0xc00d5212-hevc-from-microsoft-store-for-free/