代码搜索:attack
找到约 4,769 项符合「attack」的源代码
代码结果 4,769
www.eeworm.com/read/220866/14785932
npc palace.npc
该图Npc数 =12;
ID =40001; //角色唯一编号
Pic =12; //角色图片编号
Enemy =1; //角色是否是敌人 1=是,0=否
TalkNum =0; //对话编号
Active =1; //角色是否活动
Show =1; //角色是否可见
Name[32] =飞将军;
www.eeworm.com/read/220866/14785936
npc shop02.npc
该图Npc数 =2;
ID =69999; //角色唯一编号
Pic =3; //角色图片编号
Enemy =0; //角色是否是敌人 1=是,0=否
TalkNum =0; //对话编号
Active =1; //角色是否活动
Show =1; //角色是否可见
Name[32] =老板娘; //
www.eeworm.com/read/220866/14785944
npc shop03.npc
该图Npc数 =5;
ID =79999; //角色唯一编号
Pic =1; //角色图片编号
Enemy =0; //角色是否是敌人 1=是,0=否
TalkNum =0; //对话编号
Active =1; //角色是否活动
Show =1; //角色是否可见
Name[32] =收荒匠; //
www.eeworm.com/read/473927/6822234
txt 3827.txt
Rule:
--
Sid:
3827
--
Summary:
This event is generated when an attempt is made to exploit a vulnerability
associated with the PHP XML-RPC module.
--
Impact:
Serious. Execution of arbitrary commands
www.eeworm.com/read/473927/6822382
txt 382.txt
Rule:
--
Sid:
382
--
Summary:
This event is generated when an ICMP echo request is made from a Windows 9x or 2000 host.
--
Impact:
Information gathering. An ICMP echo request can determine if a h
www.eeworm.com/read/473927/6822437
txt 122-10.txt
Rule:
--
Sid:
122-10
--
Summary:
This event is generated when the pre-processor sfPortscan detects
network traffic that may constitute an attack. Specifically an ip decoy
protocol scan was detecte
www.eeworm.com/read/473927/6822497
txt 122-18.txt
Rule:
--
Sid:
122-18
--
Summary:
This event is generated when the pre-processor sfPortscan detects
network traffic that may constitute an attack. Specifically a udp decoy
portscan was detected.
-
www.eeworm.com/read/473927/6822578
txt 462.txt
Rule:
--
Sid:
462
--
Summary:
This event is generated when an ICMP Type 7 datagram with an undefined ICMP Code is detected on the network.
--
Impact:
ICMP Type 7 datagrams are not currently use
www.eeworm.com/read/473927/6822604
txt 122-22.txt
Rule:
--
Sid:
122-22
--
Summary:
This event is generated when the pre-processor sfPortscan detects
network traffic that may constitute an attack. Specifically a udp
filtered decoy portscan was det
www.eeworm.com/read/473927/6822680
txt 122-13.txt
Rule:
--
Sid:
122-13
--
Summary:
This event is generated when the pre-processor sfPortscan detects
network traffic that may constitute an attack. Specifically an ips
filtered protocol scan was det