代码搜索结果
找到约 10,000 项符合
State Machine 的代码
7801.txt
Rule:
--
Sid:
7801
--
Summary:
This event is generated when activity relating to the "portal of doom" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
10075.txt
Rule:
--
Sid:
10075
--
Summary:
This event is generated when activity relating to the "Peacomm" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
12661.txt
Rule:
--
Sid:
12661
--
Summary:
This event is generated when activity relating to the "troll.a" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
7111.txt
Rule:
--
Sid:
7111
--
Summary:
This event is generated when activity relating to the "fearless lite 1.01" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targ
6019.txt
Rule:
--
Sid:
6019
--
Summary:
This event is generated when activity relating to the "dsk lite 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted m
8362.txt
Rule:
--
Sid:
8362
--
Summary:
This event is generated when activity relating to the "black curse 4.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete
7648.txt
Rule:
--
Sid:
7648
--
Summary:
This event is generated when activity relating to the "minicom lite" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted m
6026.txt
Rule:
--
Sid:
6026
--
Summary:
This event is generated when activity relating to the "dimbus 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
12164.txt
Rule:
--
Sid:
12164
--
Summary:
This event is generated when activity relating to the "cobra uploader 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the tar
6332.txt
Rule:
--
Sid:
6332
--
Summary:
This event is generated when activity relating to the "globalkiller1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete