Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).
Private Sub cmdOk_Click() Dim i As Integer 'run button strSQL = "SELECT [_Securities].* " & _ "FROM [_Securities] " & _ "WHERE ((([_Securities].[Select])=Yes));" OpenConnection Set rs = New ADODB.Recordset rs.Open strSQL, cn, adOpenKeyset If rs.EOF = False Then rs.MoveFirst ReDim Securities(1 To rs.RecordCount) For i = 1 To UBound(Securities) Securities(i) = rs![Security] rs.MoveNext Next rs.Close: Set rs = Nothing cn.Close: Set cn = Nothing With Me If .chkIndicator_Output = True Then IndicatorOutput = True If .chkSynthetic_Bars = True Then SyntheticBars = True If .chk5Min = True Then Run5Min = True If .chk15Min = True Then Run15Min = True If .chk30Min = True Then Run30Min = True If .chk60Min = True Then Run60Min = True End With DoCmd.Close acForm, "frmSecurities" DoCmd.OpenForm "frmCashValues" Else Set rs = Nothing cn.Close: Set cn = Nothing MsgBox "No securities selected", vbInformation, "Select Securities" Exit Sub End If End Sub
Join the community of 500,000 technology professionals and ask your questions.
Connect with top rated Experts
16 Experts available now in Live!