代码搜索:Command
找到约 10,000 项符合「Command」的源代码
代码结果 10,000
www.eeworm.com/read/349103/10851677
scr cnt-seq.scr
/************************************************************************/
/* Count Zeros - Sequential */
/************************************************************************/
/* */
www.eeworm.com/read/349103/10851684
scr cnt-combin.scr
/************************************************************************/
/* Count Zeros - Combinational Version */
/************************************************************************/
/*
www.eeworm.com/read/349030/10855314
1 runscript.1
.\" This file Copyright 1992,93,94 Miquel van Smoorenburg
.\" 1998-2002 Jukka Lahtinen
.\" It may be distributed under the GNU Public License, version 2, or
.\" any higher version. See section COPYIN
www.eeworm.com/read/274401/10873539
scf 显示桌面.scf
[Shell]
Command=2
IconFile=explorer.exe,3
[Taskbar]
Command=ToggleDesktop
www.eeworm.com/read/418905/10892074
cmd p&e_multilink_cyclonepro_erase_unsecure_hcs12.cmd
// ver 1.1 (7/7/04)
// HCS12X Core erasing + unsecuring command file:
// These commands mass erase the chip then program the security byte to 0xFE (unsecured state).
// Evaluate the clock divider
www.eeworm.com/read/418779/10897599
txt 1333.txt
Rule:
--
Sid:
1333
--
Summary:
Attempted id command access via web
--
Impact:
Attempt to gain information on users and groups that exist on the host
using the id command.
--
Detailed Information:
www.eeworm.com/read/418779/10897996
txt 1734.txt
Rule:
--
Sid:
1734
--
Summary:
This event is generated when an attempt is made to exploit a buffer
overflow or denial of service vulnerability associated with FTP USER command.
--
Impact:
Remote a
www.eeworm.com/read/418779/10898360
txt 1353.txt
Rule:
--
Sid:
1353
--
Summary:
Attempted nasm command access via web.
--
Impact:
Attempt to compile a binary on a host.
--
Detailed Information:
This is an attempt to compiile a program source on
www.eeworm.com/read/418779/10898657
txt 2105.txt
Rule:
--
Sid:
2105
--
Summary:
This event is generated when a remote user uses the IMAP AUTHENTICATE
command to send a suspiciously long string to port 143 on an internal
server. This may indicate a
www.eeworm.com/read/418779/10899355
txt 4144.txt
Rule:
--
Sid:
4144
--
Summary:
This event is generated when an attempt is made to exploit a known
vulnerability in Solaris Line Printer Daemon (LPD).
--
Impact:
Serious. Unauthorized removal of fil