Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.
#!/bin/sh c=$0 nc=$0 for i in `(cat tod-unr)` do c= expr $c+1 for j in `(cat yest-unr)` do if [$i == $j]; then yc=echo `sed -n '$c p' yest-num` typeset -i $yc nc= expr $yc+1 echo $nc >> yest-num-new else nc=$1 echo $nc >> yest-num-new fi done done mv tod-unr yest-unr mv yest-num-new yest-num
|java ^ examples||8||57|
|use shell script to parse json returned by a restful service||6||77|
|Replace a tag with sed||2||41|
|Xcopy - from server share to multiple IP's using batch file (not working)||5||42|
Join the community of 500,000 technology professionals and ask your questions.
Connect with top rated Experts
10 Experts available now in Live!