Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).
========================================= script.bat @echo off if [%1]== ( echo useage: script [computer_name] echo Please enter a computer name before running. goto :eof ) echo Checking the following 4 services on a machine %1 ..... rem check_services.bat <computername> for /f "tokens=1-6 delims=[.] " %%a in ('ping %1 -n 1 ^| find "["') do set ip=%%c.%%d.%%e.%%f ping -n 1 %1 >nul 2>&1 if %errorlevel%==0 ( echo %1 [%ip%]: Up ) else ( echo %1 [%ip%]: Down ) echo sc \\%ip% query alerter sc \\%ip% query alerter sc \\%ip% query browser sc \\%ip% query server rem ============================ end of file
|Macro which automatically sends attachment to Outlook||14||50|
|Exit Loop after User Input||4||29|
|Cannot get VBScript to run as schedules task||10||28|
|Using an encrypted value to decrypt and display contents in vb6||9||18|
Join the community of 500,000 technology professionals and ask your questions.
Connect with top rated Experts
11 Experts available now in Live!