代码搜索:attack

找到约 4,769 项符合「attack」的源代码

代码结果 4,769
www.eeworm.com/read/220866/14785932

npc palace.npc

该图Npc数 =12; ID =40001; //角色唯一编号 Pic =12; //角色图片编号 Enemy =1; //角色是否是敌人 1=是,0=否 TalkNum =0; //对话编号 Active =1; //角色是否活动 Show =1; //角色是否可见 Name[32] =飞将军;
www.eeworm.com/read/220866/14785936

npc shop02.npc

该图Npc数 =2; ID =69999; //角色唯一编号 Pic =3; //角色图片编号 Enemy =0; //角色是否是敌人 1=是,0=否 TalkNum =0; //对话编号 Active =1; //角色是否活动 Show =1; //角色是否可见 Name[32] =老板娘; //
www.eeworm.com/read/220866/14785944

npc shop03.npc

该图Npc数 =5; ID =79999; //角色唯一编号 Pic =1; //角色图片编号 Enemy =0; //角色是否是敌人 1=是,0=否 TalkNum =0; //对话编号 Active =1; //角色是否活动 Show =1; //角色是否可见 Name[32] =收荒匠; //
www.eeworm.com/read/473927/6822234

txt 3827.txt

Rule: -- Sid: 3827 -- Summary: This event is generated when an attempt is made to exploit a vulnerability associated with the PHP XML-RPC module. -- Impact: Serious. Execution of arbitrary commands
www.eeworm.com/read/473927/6822382

txt 382.txt

Rule: -- Sid: 382 -- Summary: This event is generated when an ICMP echo request is made from a Windows 9x or 2000 host. -- Impact: Information gathering. An ICMP echo request can determine if a h
www.eeworm.com/read/473927/6822437

txt 122-10.txt

Rule: -- Sid: 122-10 -- Summary: This event is generated when the pre-processor sfPortscan detects network traffic that may constitute an attack. Specifically an ip decoy protocol scan was detecte
www.eeworm.com/read/473927/6822497

txt 122-18.txt

Rule: -- Sid: 122-18 -- Summary: This event is generated when the pre-processor sfPortscan detects network traffic that may constitute an attack. Specifically a udp decoy portscan was detected. -
www.eeworm.com/read/473927/6822578

txt 462.txt

Rule: -- Sid: 462 -- Summary: This event is generated when an ICMP Type 7 datagram with an undefined ICMP Code is detected on the network. -- Impact: ICMP Type 7 datagrams are not currently use
www.eeworm.com/read/473927/6822604

txt 122-22.txt

Rule: -- Sid: 122-22 -- Summary: This event is generated when the pre-processor sfPortscan detects network traffic that may constitute an attack. Specifically a udp filtered decoy portscan was det
www.eeworm.com/read/473927/6822680

txt 122-13.txt

Rule: -- Sid: 122-13 -- Summary: This event is generated when the pre-processor sfPortscan detects network traffic that may constitute an attack. Specifically an ips filtered protocol scan was det