代码搜索结果

找到约 10,000 项符合 State Machine 的代码

7713.txt

Rule: -- Sid: 7713 -- Summary: This event is generated when activity relating to the "amitis v1.3" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

6148.txt

Rule: -- Sid: 6148 -- Summary: This event is generated when activity relating to the "mantis" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machine

11316.txt

Rule: -- Sid: 11316 -- Summary: This event is generated when activity relating to the "lurker 1.1" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

6121.txt

Rule: -- Sid: 6121 -- Summary: This event is generated when activity relating to the "net runner" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mac

7765.txt

Rule: -- Sid: 7765 -- Summary: This event is generated when activity relating to the "nt remote controller 2000" Trojan Horse program is detected. -- Impact: Possible theft of data and control of t

7769.txt

Rule: -- Sid: 7769 -- Summary: This event is generated when activity relating to the "data rape" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mach

6057.txt

Rule: -- Sid: 6057 -- Summary: This event is generated when activity relating to the "bifrose 1.1" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

10083.txt

Rule: -- Sid: 10083 -- Summary: This event is generated when activity relating to the "W32.Nuwar.AY" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

9661.txt

Rule: -- Sid: 9661 -- Summary: This event is generated when activity relating to the "bersek 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mac

6143.txt

Rule: -- Sid: 6143 -- Summary: This event is generated when activity relating to the "dark connection inside v1.2" Trojan Horse program is detected. -- Impact: Possible theft of data and control of