代码搜索结果
找到约 10,000 项符合
State Machine 的代码
6498.txt
Rule:
--
Sid:
6498
--
Summary:
This event is generated when activity relating to the "exploiter 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7725.txt
Rule:
--
Sid:
7725
--
Summary:
This event is generated when activity relating to the "reversable ver1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targe
7066.txt
Rule:
--
Sid:
7066
--
Summary:
This event is generated when activity relating to the "cybernetic 1.62" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete
6041.txt
Rule:
--
Sid:
6041
--
Summary:
This event is generated when activity relating to the "fade 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
12162.txt
Rule:
--
Sid:
12162
--
Summary:
This event is generated when activity relating to the "optix pro v1.32" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the target
12165.txt
Rule:
--
Sid:
12165
--
Summary:
This event is generated when activity relating to the "lithium 1.02" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7658.txt
Rule:
--
Sid:
7658
--
Summary:
This event is generated when activity relating to the "jodeitor 1.1" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted m
12242.txt
Rule:
--
Sid:
12242
--
Summary:
This event is generated when activity relating to the "hotmail hacker log edition 5.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and contro
8549.txt
Rule:
--
Sid:
8549
--
Summary:
This event is generated when activity relating to the "zxshell" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
7640.txt
Rule:
--
Sid:
7640
--
Summary:
This event is generated when activity relating to the "air" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machine le