All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.
@ECHO OFF REM - THIS COPIES THE INSTALLATION AND THE SETUP INITIALIZER TO THE C:\ DRIVE XCOPY D:\avg_ipw_stf_all_8_164a1359.exe C:\ XCOPY D:\AvgSetup.ini C:\ REM - THIS OPENS THE COMMAND PROMPT START /MAX C:\Windows\system32\cmd.exe REM - THIS SENDS THE COMMAND TO START THE INSTALLATION ***RUN avg_ipw_stf_all_8_164a1359.exe /SCRIPT_FILE C:\AvgSetup.ini*** REM - THIS CLOSES THE DOS PROMPT EXIT
|How to show after i run a batch file in a completely hidden way?||2||27|
|Searching File Names and Eliminating Duplicates in Windows||5||23|
|if "only allow certain applications" is actived in gpo, there are no batch-files running afer logon. which application should i add to get this running||2||10|
|Batch file to check if a folder exists with a certain word in||4||17|
Join the community of 500,000 technology professionals and ask your questions.
Connect with top rated Experts
11 Experts available now in Live!