Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).
esql = "select * from tblMonthlyReport1 where ID = " & Key rec.Open (esql), conn, adOpenDynamic, adLockOptimistic For i = 16 To 43 If IsNull(rec.Fields(i)) Then rec.Fields(i) = "" End If Next i Dim k As Integer For k = 1 To 23 MR2.Controls("Text" & k) = rec.Fields(("Text" & k)) Next k For k = 1 To 5 MR2.Controls("Combo" & k) = rec.Fields(("Combo" & k)) Next k If Not rec.EOF Then rec.MoveNext rec.Close
|how to open Waze.com/livemap from address saved in DB?||26||116|
|How to create a duplicate finder Application||9||74|
|VBScript - Find file starting with XXXX use that in runnig rest of code||9||44|
|A macro to Count the number of rows across all worksheets||3||47|
Join the community of 500,000 technology professionals and ask your questions.
Connect with top rated Experts
18 Experts available now in Live!