代码搜索结果

找到约 10,000 项符合 State Machine 的代码

6498.txt

Rule: -- Sid: 6498 -- Summary: This event is generated when activity relating to the "exploiter 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

7725.txt

Rule: -- Sid: 7725 -- Summary: This event is generated when activity relating to the "reversable ver1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targe

7066.txt

Rule: -- Sid: 7066 -- Summary: This event is generated when activity relating to the "cybernetic 1.62" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targete

6041.txt

Rule: -- Sid: 6041 -- Summary: This event is generated when activity relating to the "fade 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

12162.txt

Rule: -- Sid: 12162 -- Summary: This event is generated when activity relating to the "optix pro v1.32" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the target

12165.txt

Rule: -- Sid: 12165 -- Summary: This event is generated when activity relating to the "lithium 1.02" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

7658.txt

Rule: -- Sid: 7658 -- Summary: This event is generated when activity relating to the "jodeitor 1.1" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted m

12242.txt

Rule: -- Sid: 12242 -- Summary: This event is generated when activity relating to the "hotmail hacker log edition 5.0" Trojan Horse program is detected. -- Impact: Possible theft of data and contro

8549.txt

Rule: -- Sid: 8549 -- Summary: This event is generated when activity relating to the "zxshell" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machin

7640.txt

Rule: -- Sid: 7640 -- Summary: This event is generated when activity relating to the "air" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machine le