代码搜索结果

找到约 10,000 项符合 State Machine 的代码

7701.txt

Rule: -- Sid: 7701 -- Summary: This event is generated when activity relating to the "brain wiper" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

12235.txt

Rule: -- Sid: 12235 -- Summary: This event is generated when activity relating to the "theef 2.10" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

12055.txt

Rule: -- Sid: 12055 -- Summary: This event is generated when activity relating to the "tron" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machine

7621.txt

Rule: -- Sid: 7621 -- Summary: This event is generated when activity relating to the "remote control 1.7" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targ

9653.txt

Rule: -- Sid: 9653 -- Summary: This event is generated when activity relating to the "apofis 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mac

7122.txt

Rule: -- Sid: 7122 -- Summary: This event is generated when activity relating to the "y3k 1.2" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machin

6292.txt

Rule: -- Sid: 6292 -- Summary: This event is generated when activity relating to the "joker ddos v1.0.1" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targe

2100.txt

Rule: -- Sid: 2100 -- Summary: This event indicates that network activity relating to the Trojan Horse program Subseven 2.1 Gold has been detected. This software offers complete control of the infe

6039.txt

Rule: -- Sid: 6039 -- Summary: This event is generated when activity relating to the "fade 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

7672.txt

Rule: -- Sid: 7672 -- Summary: This event is generated when activity relating to the "remoter" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machin