代码搜索结果
找到约 10,000 项符合
State Machine 的代码
http:^^merv.cs.nyu.edu:8001^~binli^plinda^faq.html
Date: Tuesday, 14-Jan-97 18:59:33 GMT
Server: NCSA/1.3
MIME-version: 1.0
Content-type: text/html
Last-modified: Thursday, 07-Nov-96 16:08:58 GMT
Content-length: 4420
readme
Tue Feb 13 10:47:25 CST 1996
Andy Fingerhut (jaf@arl.wustl.edu)
File formats:
.au
Sun/NeXT audio file format. These have headers specifying the
sampling rate, number of channels, sample format, a
146.txt
Rule:
--
Sid:
146
--
Summary:
Netsphere is a Trojan Horse offering the attacker access to the victims
filesystem, instant messaging clients and some control over peripherals.
This event is generate
213.txt
Rule:
--
Sid:
213
--
Summary:
This event is generated when an attacker attempts to connect to a
Telnet server using the phrase "wh00t!".
--
Impact:
Possible theft of data and control of the targe
176.txt
Rule:
--
Sid:
146
--
Summary:
Netsphere is a Trojan Horse offering the attacker access to the victims
filesystem, instant messaging clients and some control over peripherals.
This event is generate
219.txt
Rule:
--
Sid:
219
--
Summary:
This event is generated when an attacker attempts to connect to a
Telnet server using the phrase "StoogR". This is a known password for
the HidePak rootkit.
--
Impa
111.txt
--
Rule:
--
Sid:111
--
Summary:
This event is generated when an attacker is connected to a Netbus trojan
and issues the command 'getinfo'
--
Impact:
Possible theft of data and control of the target
217.txt
Rule:
--
Sid:
217
--
Summary:
This event is generated when an attacker attempts to connect to a
Telnet server using the phrase "hax0r". This is a known password for
the sm4ck Linux rootkit.
--
I
210.txt
Rule:
--
Sid:
210
--
Summary:
This event is generated when an attacker attempts to connect to a Telnet server using the phrase "backdoor".
--
Impact:
Possible theft of data and control of the targ
155.txt
Rule:
--
Sid:
155
--
Summary:
Netsphere is a Trojan Horse offering the attacker access to the victims
filesystem, instant messaging clients and some control over peripherals.
This event is generate