代码搜索结果

找到约 10,000 项符合 State Machine 的代码

7691.txt

Rule: -- Sid: 7691 -- Summary: This event is generated when activity relating to the "evade" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machine

7646.txt

Rule: -- Sid: 7646 -- Summary: This event is generated when activity relating to the "snipernet 2.1" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

6158.txt

Rule: -- Sid: 6158 -- Summary: This event is generated when activity relating to the "satanz Backdoor" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targete

7619.txt

Rule: -- Sid: 7619 -- Summary: This event is generated when activity relating to the "theef 2.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mach

6401.txt

Rule: -- Sid: 6401 -- Summary: This event is generated when activity relating to the "snowdoor" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

10076.txt

Rule: -- Sid: 10076 -- Summary: This event is generated when activity relating to the "Peacomm" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

7096.txt

Rule: -- Sid: 7096 -- Summary: This event is generated when activity relating to the "remote hack 1.5" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targete

10451.txt

Rule: -- Sid: 10451 -- Summary: This event is generated when activity relating to the "only 1 rat" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

6059.txt

Rule: -- Sid: 6059 -- Summary: This event is generated when activity relating to the "neurotickat1.3" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

7670.txt

Rule: -- Sid: 7670 -- Summary: This event is generated when activity relating to the "digital upload" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted