代码搜索结果

找到约 10,000 项符合 State Machine 的代码

7628.txt

Rule: -- Sid: 7628 -- Summary: This event is generated when activity relating to the "skyrat show" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

10074.txt

Rule: -- Sid: 10074 -- Summary: This event is generated when activity relating to the "Peacomm" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

7789.txt

Rule: -- Sid: 7789 -- Summary: This event is generated when activity relating to the "forced control uploader" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the

7611.txt

Rule: -- Sid: 7611 -- Summary: This event is generated when activity relating to the "flux 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

13506.txt

Rule: -- Sid: 13506 -- Summary: This event is generated when activity relating to the "evilotus 1.3.2" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targete

7714.txt

Rule: -- Sid: 7714 -- Summary: This event is generated when activity relating to the "netdevil" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

7084.txt

Rule: -- Sid: 7084 -- Summary: This event is generated when activity relating to the "erazer v1.1" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

12166.txt

Rule: -- Sid: 12166 -- Summary: This event is generated when activity relating to the "lithium 1.02" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

7778.txt

Rule: -- Sid: 7778 -- Summary: This event is generated when activity relating to the "elfrat" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machine

12151.txt

Rule: -- Sid: 12151 -- Summary: This event is generated when activity relating to the "cafeini 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted m