代码搜索结果

找到约 10,000 项符合 State Machine 的代码

7748.txt

Rule: -- Sid: 7748 -- Summary: This event is generated when activity relating to the "bobo 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

12376.txt

Rule: -- Sid: 12376 -- Summary: This event is generated when activity relating to the "radmin 3.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

7629.txt

Rule: -- Sid: 7629 -- Summary: This event is generated when activity relating to the "skyrat show" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

12052.txt

Rule: -- Sid: 12052 -- Summary: This event is generated when activity relating to the "the[x] 1.2" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

10079.txt

Rule: -- Sid: 10079 -- Summary: This event is generated when activity relating to the "W32.Nuwar.AY" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

7118.txt

Rule: -- Sid: 7118 -- Summary: This event is generated when activity relating to the "y3k 1.2" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machin

7727.txt

Rule: -- Sid: 7727 -- Summary: This event is generated when activity relating to the "reversable ver1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targe

7679.txt

Rule: -- Sid: 7679 -- Summary: This event is generated when activity relating to the "cool remote control 1.12" Trojan Horse program is detected. -- Impact: Possible theft of data and control of th

6396.txt

Rule: -- Sid: 6396 -- Summary: This event is generated when activity relating to the "a-311 death" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

7643.txt

Rule: -- Sid: 7643 -- Summary: This event is generated when activity relating to the "netcontrol takeover" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the tar