代码搜索结果

找到约 10,000 项符合 State Machine 的代码

7756.txt

Rule: -- Sid: 7756 -- Summary: This event is generated when activity relating to the "beast 2.02" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mac

7682.txt

Rule: -- Sid: 7682 -- Summary: This event is generated when activity relating to the "acid head 1.00" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

7757.txt

Rule: -- Sid: 7757 -- Summary: This event is generated when activity relating to the "beast 2.02" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mac

7114.txt

Rule: -- Sid: 7114 -- Summary: This event is generated when activity relating to the "donalddick v1.5b3" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targe

10105.txt

Rule: -- Sid: 10105 -- Summary: This event is generated when activity relating to the "hav-rat 1.1" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted m

12726.txt

Rule: -- Sid: 12726 -- Summary: This event is generated when activity relating to the "bandook 1.35" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

1984.txt

Rule: -- Sid: 1984 -- Summary: Deepthroat is a Trojan Horse offering the attacker control of the target. -- Impact: Possible theft of data and control of the targeted machine leading to a compromis

10068.txt

Rule: -- Sid: 10068 -- Summary: This event is generated when activity relating to the "Peacomm" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

6098.txt

Rule: -- Sid: 6098 -- Summary: This event is generated when activity relating to the "alvgus 2000" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

6090.txt

Rule: -- Sid: 6090 -- Summary: This event is generated when activity relating to the "a trojan 2.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted m