代码搜索结果

找到约 10,000 项符合 State Machine 的代码

7103.txt

Rule: -- Sid: 7103 -- Summary: This event is generated when activity relating to the "gwboy 0.92" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mac

7720.txt

Rule: -- Sid: 7720 -- Summary: This event is generated when activity relating to the "desktop scout" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

6181.txt

Rule: -- Sid: 6181 -- Summary: This event is generated when activity relating to the "netraider 0.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

6025.txt

Rule: -- Sid: 6025 -- Summary: This event is generated when activity relating to the "tequila bandita 1.2" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the tar

7734.txt

Rule: -- Sid: 7734 -- Summary: This event is generated when activity relating to the "bionet 4.05" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

7057.txt

Rule: -- Sid: 7057 -- Summary: This event is generated when activity relating to the "charon" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machine

6474.txt

Rule: -- Sid: 6474 -- Summary: This event is generated when activity relating to the "loosky" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machine

6128.txt

Rule: -- Sid: 6128 -- Summary: This event is generated when activity relating to the "dkangel" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machin

7108.txt

Rule: -- Sid: 7108 -- Summary: This event is generated when activity relating to the "undetected" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mac

6176.txt

Rule: -- Sid: 6176 -- Summary: This event is generated when activity relating to the "guptachar 2.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted