Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.
@echo on set var=\\backup01\backup\adsci\ set compDate=%date:~6,4%-%date:~3,2%-%date:~0,2%kjhjkh >> completed.txt if dir %var% %compDate% goto 20 echo Found - File Name is : %var% - %dated% > completed.txt dir %var% >> completed.txt goto end :20 echo No File found For %compDate% >> notexists.txt :end
Join the community of 500,000 technology professionals and ask your questions.
Connect with top rated Experts
11 Experts available now in Live!