These signatures are based on TFTP traffic. These include malicious files
that are distrubted via TFTP.
The last two signatures refer to generic GET and PUT via TFTP, which is
generally frowned upon on most networks, but may be used in some enviornments