代码搜索结果
找到约 10,000 项符合
State Machine 的代码
6290.txt
Rule:
--
Sid:
6290
--
Summary:
This event is generated when activity relating to the "netspy" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machine
6127.txt
Rule:
--
Sid:
6127
--
Summary:
This event is generated when activity relating to the "dkangel" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
7700.txt
Rule:
--
Sid:
7700
--
Summary:
This event is generated when activity relating to the "brain wiper" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
6288.txt
Rule:
--
Sid:
6288
--
Summary:
This event is generated when activity relating to the "fictional daemon 4.4" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the ta
6165.txt
Rule:
--
Sid:
6165
--
Summary:
This event is generated when activity relating to the "psyrat 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
13245.txt
Rule:
--
Sid:
13245
--
Summary:
This event is generated when activity relating to the "troya 1.4" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
10442.txt
Rule:
--
Sid:
10442
--
Summary:
This event is generated when activity relating to the "nirvana 2.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted m
10447.txt
Rule:
--
Sid:
10447
--
Summary:
This event is generated when activity relating to the "51d 1b" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
7696.txt
Rule:
--
Sid:
7696
--
Summary:
This event is generated when activity relating to the "hanky panky 1.1" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete
12241.txt
Rule:
--
Sid:
12241
--
Summary:
This event is generated when activity relating to the "genie 1.7" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac