代码搜索结果

找到约 10,000 项符合 State Machine 的代码

7779.txt

Rule: -- Sid: 7779 -- Summary: This event is generated when activity relating to the "net devil 1.4" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

7702.txt

Rule: -- Sid: 7702 -- Summary: This event is generated when activity relating to the "roach 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mach

7755.txt

Rule: -- Sid: 7755 -- Summary: This event is generated when activity relating to the "buschtrommel 1.22" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targe

7740.txt

Rule: -- Sid: 7740 -- Summary: This event is generated when activity relating to the "nova 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

6473.txt

Rule: -- Sid: 6473 -- Summary: This event is generated when activity relating to the "bugs" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machine l

11951.txt

Rule: -- Sid: 11951 -- Summary: This event is generated when activity relating to the "winshadow" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mac

7777.txt

Rule: -- Sid: 7777 -- Summary: This event is generated when activity relating to the "messiah 4.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

6402.txt

Rule: -- Sid: 6402 -- Summary: This event is generated when activity relating to the "netangel" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

7090.txt

Rule: -- Sid: 7090 -- Summary: This event is generated when activity relating to the "sinique 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

6397.txt

Rule: -- Sid: 6397 -- Summary: This event is generated when activity relating to the "http rat" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi