代码搜索结果
找到约 10,000 项符合
State Machine 的代码
7694.txt
Rule:
--
Sid:
7694
--
Summary:
This event is generated when activity relating to the "exception 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7676.txt
Rule:
--
Sid:
7676
--
Summary:
This event is generated when activity relating to the "cool remote control 1.12" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of th
7119.txt
Rule:
--
Sid:
7119
--
Summary:
This event is generated when activity relating to the "y3k 1.2" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
7631.txt
Rule:
--
Sid:
7631
--
Summary:
This event is generated when activity relating to the "hornet 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
6179.txt
Rule:
--
Sid:
6179
--
Summary:
This event is generated when activity relating to the "bladerunner 0.80" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the target
12684.txt
Rule:
--
Sid:
12684
--
Summary:
This event is generated when activity relating to the "Sygate Remote Administration Engine" Trojan Horse program is detected.
--
Impact:
Possible theft of data and c
7688.txt
Rule:
--
Sid:
7688
--
Summary:
This event is generated when activity relating to the "illusion" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
6286.txt
Rule:
--
Sid:
6286
--
Summary:
This event is generated when activity relating to the "antilamer 1.1" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7683.txt
Rule:
--
Sid:
7683
--
Summary:
This event is generated when activity relating to the "acid head 1.00" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7663.txt
Rule:
--
Sid:
7663
--
Summary:
This event is generated when activity relating to the "snid x2 v1.2" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted m