代码搜索结果
找到约 10,000 项符合
State Machine 的代码
6080.txt
Rule:
--
Sid:
6080
--
Summary:
This event is generated when activity relating to the "autospy" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
7063.txt
Rule:
--
Sid:
7063
--
Summary:
This event is generated when activity relating to the "charon" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machine
7759.txt
Rule:
--
Sid:
7759
--
Summary:
This event is generated when activity relating to the "glacier" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
10108.txt
Rule:
--
Sid:
10108
--
Summary:
This event is generated when activity relating to the "icmp cmd 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7822.txt
Rule:
--
Sid:
7822
--
Summary:
This event is generated when activity relating to the "xbkdr" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machine
7749.txt
Rule:
--
Sid:
7749
--
Summary:
This event is generated when activity relating to the "bobo 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
6115.txt
Rule:
--
Sid:
6115
--
Summary:
This event is generated when activity relating to the "optix 1.32" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
7666.txt
Rule:
--
Sid:
7666
--
Summary:
This event is generated when activity relating to the "screen control 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targ
6029.txt
Rule:
--
Sid:
6029
--
Summary:
This event is generated when activity relating to the "fkwp 2.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
6331.txt
Rule:
--
Sid:
6331
--
Summary:
This event is generated when activity relating to the "globalkiller1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete