代码搜索结果
找到约 10,000 项符合
State Machine 的代码
7674.txt
Rule:
--
Sid:
7674
--
Summary:
This event is generated when activity relating to the "remote havoc" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted m
6033.txt
Rule:
--
Sid:
6033
--
Summary:
This event is generated when activity relating to the "fkwp 2.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
10403.txt
Rule:
--
Sid:
10403
--
Summary:
This event is generated when activity relating to the "Duntek" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
7638.txt
Rule:
--
Sid:
7638
--
Summary:
This event is generated when activity relating to the "ncph" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machine l
12373.txt
Rule:
--
Sid:
12373
--
Summary:
This event is generated when activity relating to the "radmin 3.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
7686.txt
Rule:
--
Sid:
7686
--
Summary:
This event is generated when activity relating to the "illusion" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
7095.txt
Rule:
--
Sid:
7095
--
Summary:
This event is generated when activity relating to the "uprising screen control 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of
6328.txt
Rule:
--
Sid:
6328
--
Summary:
This event is generated when activity relating to the "commando" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
13625.txt
Rule:
--
Sid:
13625
--
Summary:
This event is generated when activity relating to the "MBR rootkit" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted m
7717.txt
Rule:
--
Sid:
7717
--
Summary:
This event is generated when activity relating to the "snake trojan" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted m