代码搜索结果
找到约 10,000 项符合
State Machine 的代码
7107.txt
Rule:
--
Sid:
7107
--
Summary:
This event is generated when activity relating to the "girlfriend" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
10456.txt
Rule:
--
Sid:
10456
--
Summary:
This event is generated when activity relating to the "[x]-ztoo 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7718.txt
Rule:
--
Sid:
7718
--
Summary:
This event is generated when activity relating to the "dameware mini remote control" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control o
7800.txt
Rule:
--
Sid:
7800
--
Summary:
This event is generated when activity relating to the "incommand 1.7" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
12233.txt
Rule:
--
Sid:
12233
--
Summary:
This event is generated when activity relating to the "theef 2.10" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
6319.txt
Rule:
--
Sid:
6319
--
Summary:
This event is generated when activity relating to the "evilftp" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
6114.txt
Rule:
--
Sid:
6114
--
Summary:
This event is generated when activity relating to the "optix 1.32" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
7120.txt
Rule:
--
Sid:
7120
--
Summary:
This event is generated when activity relating to the "y3k 1.2" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
11320.txt
Rule:
--
Sid:
11320
--
Summary:
This event is generated when activity relating to the "netwindow" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
6159.txt
Rule:
--
Sid:
6159
--
Summary:
This event is generated when activity relating to the "delirium of disorder" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the ta