代码搜索:Detects
找到约 419 项符合「Detects」的源代码
代码结果 419
www.eeworm.com/read/163233/5511062
cc segbreakdet.cc
//
// SegBreakDet - detects all the possible segmant breaks (which are
// the freeman bvectors 0,1, and 2.
// Input - reads HWRawDataC records from standard in, w/ freeman vect events.
// Output - wr
www.eeworm.com/read/439112/1808292
nasl osticket_backdoored.nasl
#
# This script was written by Noam Rathaus
#
# GPLv2
#
# From: Guy Pearce
# Date: 21.6.2004 08:01
# Subject: Multiple osTicket exploits!
# This script detects those osTicket
www.eeworm.com/read/473927/6822342
txt 119-15.txt
Rule:
--
Sid:
119-15
--
Summary:
This event is generated when the pre-processor http_inspect
detects network traffic that may constitute an attack.
--
Impact:
Unknown. This may indicate an at
www.eeworm.com/read/473927/6822725
txt 111-4.txt
Rule:
--
Sid:
111-4
--
Summary:
This event is generated when the pre-processor stream4
detects network traffic that may constitute an attack.
--
Impact:
Unknown.
--
Detailed Information:
The
www.eeworm.com/read/473927/6822736
txt 119-3.txt
Rule:
--
Sid:
119-3
--
Summary:
This event is generated when the pre-processor http_inspect
detects network traffic that may constitute an attack.
--
Impact:
Unknown. This may be an attempt
www.eeworm.com/read/473927/6823909
txt 119-16.txt
Rule:
--
Sid:
119-16
--
Summary:
This event is generated when the pre-processor http_inspect
detects network traffic that may constitute an attack.
--
Impact:
Unknown. This may be an attempt
www.eeworm.com/read/473927/6824295
txt 119-12.txt
Rule:
--
Sid:
119-12
--
Summary:
This event is generated when the pre-processor http_inspect
detects network traffic that may constitute an attack.
--
Impact:
Unkown.
--
Detailed Information
www.eeworm.com/read/473927/6824806
txt 120-1.txt
Rule:
--
Sid:
120-1
--
Summary:
This event is generated when the pre-processor http_inspect
detects network traffic that may constitute an attack.
--
Impact:
Unknown.
--
Detailed Information
www.eeworm.com/read/473927/6824971
txt 122-14.txt
Rule:
--
Sid:
122-14
--
Summary:
This event is generated when the pre-processor sfPortscan detects
network traffic that may constitute an attack. Specifically an ip
filtered decoy protocol scan wa
www.eeworm.com/read/375764/9350133
c siftfeat.c
/*
This program detects image features using SIFT keypoints. For more info,
refer to:
Lowe, D. Distinctive image features from scale-invariant keypoints.
International Journal of Computer Vision, 60,