代码搜索结果
找到约 10,000 项符合
State Machine 的代码
7756.txt
Rule:
--
Sid:
7756
--
Summary:
This event is generated when activity relating to the "beast 2.02" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
7682.txt
Rule:
--
Sid:
7682
--
Summary:
This event is generated when activity relating to the "acid head 1.00" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7757.txt
Rule:
--
Sid:
7757
--
Summary:
This event is generated when activity relating to the "beast 2.02" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
7114.txt
Rule:
--
Sid:
7114
--
Summary:
This event is generated when activity relating to the "donalddick v1.5b3" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targe
10105.txt
Rule:
--
Sid:
10105
--
Summary:
This event is generated when activity relating to the "hav-rat 1.1" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted m
12726.txt
Rule:
--
Sid:
12726
--
Summary:
This event is generated when activity relating to the "bandook 1.35" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
1984.txt
Rule:
--
Sid:
1984
--
Summary:
Deepthroat is a Trojan Horse offering the attacker control of the target.
--
Impact:
Possible theft of data and control of the targeted machine leading to a compromis
10068.txt
Rule:
--
Sid:
10068
--
Summary:
This event is generated when activity relating to the "Peacomm" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
6098.txt
Rule:
--
Sid:
6098
--
Summary:
This event is generated when activity relating to the "alvgus 2000" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
6090.txt
Rule:
--
Sid:
6090
--
Summary:
This event is generated when activity relating to the "a trojan 2.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted m