代码搜索结果

找到约 10,000 项符合 State Machine 的代码

7782.txt

Rule: -- Sid: 7782 -- Summary: This event is generated when activity relating to the "net devil 1.4" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

7695.txt

Rule: -- Sid: 7695 -- Summary: This event is generated when activity relating to the "hanky panky 1.1" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targete

7655.txt

Rule: -- Sid: 7655 -- Summary: This event is generated when activity relating to the "small uploader 1.01" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the tar

7746.txt

Rule: -- Sid: 7746 -- Summary: This event is generated when activity relating to the "bobo 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

7625.txt

Rule: -- Sid: 7625 -- Summary: This event is generated when activity relating to the "skyrat show" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

6092.txt

Rule: -- Sid: 6092 -- Summary: This event is generated when activity relating to the "a trojan 2.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted m

12156.txt

Rule: -- Sid: 12156 -- Summary: This event is generated when activity relating to the "optix pro v1.32" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the target

7649.txt

Rule: -- Sid: 7649 -- Summary: This event is generated when activity relating to the "minicom lite" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted m

11317.txt

Rule: -- Sid: 11317 -- Summary: This event is generated when activity relating to the "abremote pro 3.1" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targe

7639.txt

Rule: -- Sid: 7639 -- Summary: This event is generated when activity relating to the "air" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machine le