代码搜索结果

找到约 10,000 项符合 State Machine 的代码

7681.txt

Rule: -- Sid: 7681 -- Summary: This event is generated when activity relating to the "cool remote control 1.12" Trojan Horse program is detected. -- Impact: Possible theft of data and control of th

7630.txt

Rule: -- Sid: 7630 -- Summary: This event is generated when activity relating to the "helios 3.1" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mac

12375.txt

Rule: -- Sid: 12375 -- Summary: This event is generated when activity relating to the "radmin 3.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

6014.txt

Rule: -- Sid: 6014 -- Summary: This event is generated when activity relating to the "coolcat" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machin

6124.txt

Rule: -- Sid: 6124 -- Summary: This event is generated when activity relating to the "ambush 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mac

12699.txt

Rule: -- Sid: 12699 -- Summary: This event is generated when activity relating to the "poison ivy 2.3.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targe

7065.txt

Rule: -- Sid: 7065 -- Summary: This event is generated when activity relating to the "cybernetic 1.62" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targete

6088.txt

Rule: -- Sid: 6088 -- Summary: This event is generated when activity relating to the "a trojan 2.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted m

10197.txt

Rule: -- Sid: 10197 -- Summary: This event is generated when activity relating to the "Wordpress backdoor theme.php code execution" Trojan Horse program is detected. -- Impact: Possible theft of da

10168.txt

Rule: -- Sid: 10168 -- Summary: This event is generated when activity relating to the "one" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machine l