代码搜索结果
找到约 10,000 项符合
State Machine 的代码
11319.txt
Rule:
--
Sid:
11319
--
Summary:
This event is generated when activity relating to the "netwindow" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
6018.txt
Rule:
--
Sid:
6018
--
Summary:
This event is generated when activity relating to the "dsk lite 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted m
10106.txt
Rule:
--
Sid:
10106
--
Summary:
This event is generated when activity relating to the "icmp cmd 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
10110.txt
Rule:
--
Sid:
10110
--
Summary:
This event is generated when activity relating to the "poison ivy 2.1.2" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targe
9655.txt
Rule:
--
Sid:
9655
--
Summary:
This event is generated when activity relating to the "apofis 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
7091.txt
Rule:
--
Sid:
7091
--
Summary:
This event is generated when activity relating to the "serveme" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
13509.txt
Rule:
--
Sid:
13509
--
Summary:
This event is generated when activity relating to the "xploit 1.4.5 pc" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the target
7106.txt
Rule:
--
Sid:
7106
--
Summary:
This event is generated when activity relating to the "girlfriend" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
8077.txt
Rule:
--
Sid:
8077
--
Summary:
This event is generated when activity relating to the "mithril" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
6122.txt
Rule:
--
Sid:
6122
--
Summary:
This event is generated when activity relating to the "millenium v1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted