代码搜索结果

找到约 10,000 项符合 State Machine 的代码

7771.txt

Rule: -- Sid: 7771 -- Summary: This event is generated when activity relating to the "messiah 4.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

7687.txt

Rule: -- Sid: 7687 -- Summary: This event is generated when activity relating to the "illusion" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

10450.txt

Rule: -- Sid: 10450 -- Summary: This event is generated when activity relating to the "only 1 rat" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

6338.txt

Rule: -- Sid: 6338 -- Summary: This event is generated when activity relating to the "hatredfriend" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted m

10454.txt

Rule: -- Sid: 10454 -- Summary: This event is generated when activity relating to the "[x]-ztoo 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

7750.txt

Rule: -- Sid: 7750 -- Summary: This event is generated when activity relating to the "buschtrommel 1.22" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targe

7085.txt

Rule: -- Sid: 7085 -- Summary: This event is generated when activity relating to the "erazer v1.1" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

12297.txt

Rule: -- Sid: 12297 -- Summary: This event is generated when activity relating to the "bifrost v1.2.1" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targete

7622.txt

Rule: -- Sid: 7622 -- Summary: This event is generated when activity relating to the "remote control 1.7" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targ

7818.txt

Rule: -- Sid: 7818 -- Summary: This event is generated when activity relating to the "infector v1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted