代码搜索结果

找到约 10,000 项符合 State Machine 的代码

105.txt

Rule: -- Sid: 105 -- Summary: This event is generated when activity from the Dagger trojan horse program is detected in network traffic. -- Impact: Possible theft of data and control of the targete

7097.txt

Rule: -- Sid: 7097 -- Summary: This event is generated when activity relating to the "remote hack 1.5" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targete

9837.txt

Rule: -- Sid: 9837 -- Summary: This event is generated when activity relating to the "sun shadow 1.70" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targete

7821.txt

Rule: -- Sid: 7821 -- Summary: This event is generated when activity relating to the "nightcreature beta 0.01" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the

11949.txt

Rule: -- Sid: 11949 -- Summary: This event is generated when activity relating to the "lame rat v1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

6336.txt

Rule: -- Sid: 6336 -- Summary: This event is generated when activity relating to the "buttman v0.9p" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

7692.txt

Rule: -- Sid: 7692 -- Summary: This event is generated when activity relating to the "exception 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

10080.txt

Rule: -- Sid: 10080 -- Summary: This event is generated when activity relating to the "W32.Nuwar.AY" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

6150.txt

Rule: -- Sid: 6150 -- Summary: This event is generated when activity relating to the "netcontrol v1.0.8" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targe

10455.txt

Rule: -- Sid: 10455 -- Summary: This event is generated when activity relating to the "[x]-ztoo 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted