代码搜索结果
找到约 10,000 项符合
State Machine 的代码
10445.txt
Rule:
--
Sid:
10445
--
Summary:
This event is generated when activity relating to the "acidbattery 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the target
7770.txt
Rule:
--
Sid:
7770
--
Summary:
This event is generated when activity relating to the "messiah 4.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
6082.txt
Rule:
--
Sid:
6082
--
Summary:
This event is generated when activity relating to the "autospy" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
7109.txt
Rule:
--
Sid:
7109
--
Summary:
This event is generated when activity relating to the "vampire" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
6016.txt
Rule:
--
Sid:
6016
--
Summary:
This event is generated when activity relating to the "dsk lite 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted m
11314.txt
Rule:
--
Sid:
11314
--
Summary:
This event is generated when activity relating to the "shadownet remote spy 2.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of t
6308.txt
Rule:
--
Sid:
6308
--
Summary:
This event is generated when activity relating to the "lamespy" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
12149.txt
Rule:
--
Sid:
12149
--
Summary:
This event is generated when activity relating to the "back orifice 2006 - v1.1.5" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of
12240.txt
Rule:
--
Sid:
12240
--
Summary:
This event is generated when activity relating to the "genie 1.7" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
12147.txt
Rule:
--
Sid:
12147
--
Summary:
This event is generated when activity relating to the "blue eye 1.0b" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted