代码搜索结果

找到约 10,000 项符合 State Machine 的代码

7729.txt

Rule: -- Sid: 7729 -- Summary: This event is generated when activity relating to the "radmin" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machine

6113.txt

Rule: -- Sid: 6113 -- Summary: This event is generated when activity relating to the "optix 1.32" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mac

7074.txt

Rule: -- Sid: 7074 -- Summary: This event is generated when activity relating to the "w32.dumaru.gen" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

6138.txt

Rule: -- Sid: 6138 -- Summary: This event is generated when activity relating to the "clindestine 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targete

7753.txt

Rule: -- Sid: 7753 -- Summary: This event is generated when activity relating to the "buschtrommel 1.22" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targe

13814.txt

Rule: -- Sid: 13814 -- Summary: This event is generated when activity relating to the "passhax" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

13508.txt

Rule: -- Sid: 13508 -- Summary: This event is generated when activity relating to the "xploit 1.4.5" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

8076.txt

Rule: -- Sid: 8076 -- Summary: This event is generated when activity relating to the "mithril" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machin

7721.txt

Rule: -- Sid: 7721 -- Summary: This event is generated when activity relating to the "prorat 1.9 initial connection detection" Trojan Horse program is detected. -- Impact: Possible theft of data an

6042.txt

Rule: -- Sid: 6042 -- Summary: This event is generated when activity relating to the "fear 0.2" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi