代码搜索结果

找到约 10,000 项符合 State Machine 的代码

7694.txt

Rule: -- Sid: 7694 -- Summary: This event is generated when activity relating to the "exception 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

7676.txt

Rule: -- Sid: 7676 -- Summary: This event is generated when activity relating to the "cool remote control 1.12" Trojan Horse program is detected. -- Impact: Possible theft of data and control of th

7119.txt

Rule: -- Sid: 7119 -- Summary: This event is generated when activity relating to the "y3k 1.2" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machin

7631.txt

Rule: -- Sid: 7631 -- Summary: This event is generated when activity relating to the "hornet 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mac

6179.txt

Rule: -- Sid: 6179 -- Summary: This event is generated when activity relating to the "bladerunner 0.80" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the target

12684.txt

Rule: -- Sid: 12684 -- Summary: This event is generated when activity relating to the "Sygate Remote Administration Engine" Trojan Horse program is detected. -- Impact: Possible theft of data and c

7688.txt

Rule: -- Sid: 7688 -- Summary: This event is generated when activity relating to the "illusion" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

6286.txt

Rule: -- Sid: 6286 -- Summary: This event is generated when activity relating to the "antilamer 1.1" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

7683.txt

Rule: -- Sid: 7683 -- Summary: This event is generated when activity relating to the "acid head 1.00" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

7663.txt

Rule: -- Sid: 7663 -- Summary: This event is generated when activity relating to the "snid x2 v1.2" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted m