代码搜索结果

找到约 10,000 项符合 State Machine 的代码

13877.txt

Rule: -- Sid: 13877 -- Summary: This event is generated when activity relating to the "trojan-spy.win32.delf.uv" Trojan Horse program is detected. -- Impact: Possible theft of data and control of t

13941.txt

Rule: -- Sid: 13941 -- Summary: This event is generated when activity relating to the "trojan agent.nac" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targe

7617.txt

Rule: -- Sid: 7617 -- Summary: This event is generated when activity relating to the "theef 2.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mach

7719.txt

Rule: -- Sid: 7719 -- Summary: This event is generated when activity relating to the "dameware mini remote control" Trojan Horse program is detected. -- Impact: Possible theft of data and control o

7671.txt

Rule: -- Sid: 7671 -- Summary: This event is generated when activity relating to the "digital upload" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

7793.txt

Rule: -- Sid: 7793 -- Summary: This event is generated when activity relating to the "remote anything 5.11.22" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the

6334.txt

Rule: -- Sid: 6334 -- Summary: This event is generated when activity relating to the "backlash" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

10114.txt

Rule: -- Sid: 10114 -- Summary: This event is generated when activity relating to the "Peacomm" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

13248.txt

Rule: -- Sid: 13248 -- Summary: This event is generated when activity relating to the "yuri 1.2" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mach

10067.txt

Rule: -- Sid: 10067 -- Summary: This event is generated when activity relating to the "Peacomm" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi