![]() ![]() (Image courtesy of Radiant Productions and Plan B Entertainment. This is a scene from the 2004 movie "Troy," starring Brad Pitt, Eric Bana and Orlando Bloom. The wooden horse was perceived as a gift to the Trojans, but it was a ploy to sneak Greek soldiers behind the Trojan walls and ultimately win the war. After the Trojans brought the horse into the city, the Greek soldiers crept out at night, opened the gates of Troy to the returning soldiers, and Troy was destroyed. What is Trojan Horse Malware Trojan malware was named after the Trojan Horse that ancient Greeks used to infiltrate the city of Troy. After years of being unable to break into the fortified city, the Greeks built a wooden horse, filled it with soldiers and pretended to sail away. The term comes from Greek mythology, in which the Greeks battled the Trojans (people of Troy) in the 12th century BC. ![]() See Trojan dropper, wiretap Trojan, rootkit, RAT, Back Orifice, NetBus, PrettyPark, Talking Trojan, virus and information warfare. Often sneaking in attached to a free game or other supposedly worthwhile utility, the Trojan remains in the computer doing damage or allowing someone from a remote location to take control. A Trojan is similar to a virus, except that it does not replicate itself. ![]() It may be used to locate password information or make the system more vulnerable to future entry or simply destroy the user's stored software and data. This article is provided by FOLDOC - Free Online Dictionary of Computing ( ) TrojanA program that appears legitimate but performs some illicit activity when run. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
February 2023
Categories |