代码搜索结果

找到约 10,000 项符合 State Machine 的代码

http:^^merv.cs.nyu.edu:8001^~binli^plinda^faq.html

Date: Tuesday, 14-Jan-97 18:59:33 GMT Server: NCSA/1.3 MIME-version: 1.0 Content-type: text/html Last-modified: Thursday, 07-Nov-96 16:08:58 GMT Content-length: 4420

readme

Tue Feb 13 10:47:25 CST 1996 Andy Fingerhut (jaf@arl.wustl.edu) File formats: .au Sun/NeXT audio file format. These have headers specifying the sampling rate, number of channels, sample format, a

146.txt

Rule: -- Sid: 146 -- Summary: Netsphere is a Trojan Horse offering the attacker access to the victims filesystem, instant messaging clients and some control over peripherals. This event is generate

213.txt

Rule: -- Sid: 213 -- Summary: This event is generated when an attacker attempts to connect to a Telnet server using the phrase "wh00t!". -- Impact: Possible theft of data and control of the targe

176.txt

Rule: -- Sid: 146 -- Summary: Netsphere is a Trojan Horse offering the attacker access to the victims filesystem, instant messaging clients and some control over peripherals. This event is generate

219.txt

Rule: -- Sid: 219 -- Summary: This event is generated when an attacker attempts to connect to a Telnet server using the phrase "StoogR". This is a known password for the HidePak rootkit. -- Impa

111.txt

-- Rule: -- Sid:111 -- Summary: This event is generated when an attacker is connected to a Netbus trojan and issues the command 'getinfo' -- Impact: Possible theft of data and control of the target

217.txt

Rule: -- Sid: 217 -- Summary: This event is generated when an attacker attempts to connect to a Telnet server using the phrase "hax0r". This is a known password for the sm4ck Linux rootkit. -- I

210.txt

Rule: -- Sid: 210 -- Summary: This event is generated when an attacker attempts to connect to a Telnet server using the phrase "backdoor". -- Impact: Possible theft of data and control of the targ

155.txt

Rule: -- Sid: 155 -- Summary: Netsphere is a Trojan Horse offering the attacker access to the victims filesystem, instant messaging clients and some control over peripherals. This event is generate