代码搜索结果

找到约 10,000 项符合 State Machine 的代码

7674.txt

Rule: -- Sid: 7674 -- Summary: This event is generated when activity relating to the "remote havoc" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted m

6033.txt

Rule: -- Sid: 6033 -- Summary: This event is generated when activity relating to the "fkwp 2.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

10403.txt

Rule: -- Sid: 10403 -- Summary: This event is generated when activity relating to the "Duntek" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machin

7638.txt

Rule: -- Sid: 7638 -- Summary: This event is generated when activity relating to the "ncph" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machine l

12373.txt

Rule: -- Sid: 12373 -- Summary: This event is generated when activity relating to the "radmin 3.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

7686.txt

Rule: -- Sid: 7686 -- Summary: This event is generated when activity relating to the "illusion" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

7095.txt

Rule: -- Sid: 7095 -- Summary: This event is generated when activity relating to the "uprising screen control 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of

6328.txt

Rule: -- Sid: 6328 -- Summary: This event is generated when activity relating to the "commando" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

13625.txt

Rule: -- Sid: 13625 -- Summary: This event is generated when activity relating to the "MBR rootkit" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted m

7717.txt

Rule: -- Sid: 7717 -- Summary: This event is generated when activity relating to the "snake trojan" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted m