代码搜索结果
找到约 10,000 项符合
State Machine 的代码
7779.txt
Rule:
--
Sid:
7779
--
Summary:
This event is generated when activity relating to the "net devil 1.4" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7702.txt
Rule:
--
Sid:
7702
--
Summary:
This event is generated when activity relating to the "roach 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mach
7755.txt
Rule:
--
Sid:
7755
--
Summary:
This event is generated when activity relating to the "buschtrommel 1.22" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targe
7740.txt
Rule:
--
Sid:
7740
--
Summary:
This event is generated when activity relating to the "nova 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
6473.txt
Rule:
--
Sid:
6473
--
Summary:
This event is generated when activity relating to the "bugs" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machine l
11951.txt
Rule:
--
Sid:
11951
--
Summary:
This event is generated when activity relating to the "winshadow" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
7777.txt
Rule:
--
Sid:
7777
--
Summary:
This event is generated when activity relating to the "messiah 4.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
6402.txt
Rule:
--
Sid:
6402
--
Summary:
This event is generated when activity relating to the "netangel" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
7090.txt
Rule:
--
Sid:
7090
--
Summary:
This event is generated when activity relating to the "sinique 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
6397.txt
Rule:
--
Sid:
6397
--
Summary:
This event is generated when activity relating to the "http rat" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi