Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.
1 2 3 4
2 6 9 8
9 10 12 13
Save it to output.txt file and then load the second file and try to match the numbers in test2 to test1 so as you can see there is match which is number 2. It then loads test2.text to the output file starting from number 2 in the file. So, the result is that:
1 2 3 4
1 2 /2 3 /6 4 /9 /8
And so one. To summarise the idea, load the first text file and output the content to an output file (output.txt) and then load second file and try to match the first number with the previous data on (output.txt) when it finds matches (and it has to find on it might be the first, second, third or fourth number) then it will add the second file just next to the matched number.
1 2 /2 3 /6 4 /9 /9 /8 /10 /12 /13
|VB6 Compile Compatibility Issue||4||28|
|How to produce a SHA-1 hash function in vb6 in order to save it to a table||8||23|
|C# code editing and collaboration||3||42|
Join the community of 500,000 technology professionals and ask your questions.
Connect with top rated Experts
15 Experts available now in Live!