代码搜索结果

找到约 10,000 项符合 State Machine 的代码

6080.txt

Rule: -- Sid: 6080 -- Summary: This event is generated when activity relating to the "autospy" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machin

7063.txt

Rule: -- Sid: 7063 -- Summary: This event is generated when activity relating to the "charon" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machine

7759.txt

Rule: -- Sid: 7759 -- Summary: This event is generated when activity relating to the "glacier" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machin

10108.txt

Rule: -- Sid: 10108 -- Summary: This event is generated when activity relating to the "icmp cmd 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

7822.txt

Rule: -- Sid: 7822 -- Summary: This event is generated when activity relating to the "xbkdr" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machine

7749.txt

Rule: -- Sid: 7749 -- Summary: This event is generated when activity relating to the "bobo 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

6115.txt

Rule: -- Sid: 6115 -- Summary: This event is generated when activity relating to the "optix 1.32" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mac

7666.txt

Rule: -- Sid: 7666 -- Summary: This event is generated when activity relating to the "screen control 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targ

6029.txt

Rule: -- Sid: 6029 -- Summary: This event is generated when activity relating to the "fkwp 2.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

6331.txt

Rule: -- Sid: 6331 -- Summary: This event is generated when activity relating to the "globalkiller1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targete