A method of attacking a computer system, typically by providing a useful program which contains code intended to compromise a computer system by secretly providing for unauthorized access, the unauthorized collection of privileged system or user data, the unauthorized reading or altering of files, the performance of unintended and unexpected functions, or the malicious destruction of software and hardware. See: bomb, virus, worm.
A computer program that appears to be something useful, but then does something malicious to your computer. This could range from destroying data to laying...
Like the fabled gift to the residents of Troy, a Trojan Horse is an application designed to look innocuous. Yet, when you run the program it installs a virus or memory resident application that can steal passwords, corrupt data, or provide hackers a back door into your computer. Trojan applications are particularly dangerous since they can often run exactly as expected without showing any visible signs of intrusion.
A virus that is disguised as a useful piece of software.
A program that appears legitimate, but performs some illicit activity when it is run. It may be used to located password information or make the system more vulnerable to future entry or simply destroy programs or data on the hard disk. A Trojan horse is similar to a virus, except that it doesn’t replicate itself. It stays in the computer doing its damage or allowing somebody from a remote site to take control of the computer. Trojans often sneak in attached to a free game or other utility.
A program that appears to be valid and useful, but contains hidden instructions whose execution causes consequences not anticipated by the user. Frequently referred to as a "virus."
A program that seems to be legitimate but actually performs illicit actions when executed. Note that a trojan horse does not necessarily replicate like a virus does.
A malicious program that masquerades as a legitimate program. You may think you're opening up a compression program when in fact, you're running a Trojan Horse that erases your hard drive! Trojan Horse programs tend to be nasty, and hard to detect. They are often created on your computer with a dropper program.
The term Trojan Horse is derived from the Iliad and describes a program that pretends to have a certain (desirable) function. In addition, though, trojans contain a secret program part that opens a back door to the infected system and thus offers almost complete access to it, without the user being aware of the fact. The methods used by trojans to hide themselves are almost unlimited, and often these malicious programs are emailed as screen savers or games. Just launching them once is enough to infect the system.
Taken from mythology, the Trojan horse was used by the Greeks to defeat the Trojans at Troy. In computers, it is a program that purports to do one thing yet does something else; usually, Trojan horses are intended to damage or harass other users and their computers. See also worms and viruses.
A program designed to emulate another program (such as /bin/login) with the express intent of using the data it receives in a way that negatively impacts your productivity.
A software which pretends to be normally run but actually with attack programs on back ends.
Like its namesake from Greek mythology, a Trojan horse is something nasty that pretends to be nice. In tech terms, its a destructive program that masquerades as a benign one. It doesnt replicate itself like a virus, but it can be just as destructive as one. Among the most insidious species of Trojan horse is a program that claims it will cleanse your computer of viruses even as it introduces them.
A virus disguised as a useful program, but containing hidden instruments to perform a malicious task instead.
A trojan horse is an infection that disguises itself as a computer program that claims to be something desirable, such as a free movie or game and ends up being a destructive program that can damage your computer. These infections are not able to replicate themselves or spread throughout a network on their own.
A Trojan horse program is a malicious program that pretends to be a benign application; it purposefully does something the user does not expect. Trojans are not viruses since they do not replicate, but Trojan horse programs can be just as destructive and may be spread as a result of a viral infection. Common Trojans are keyloggers.
A computer program that carries within itself a means to allow the creator of the program access to the system using it. See also virus, worm. WWWebfx Home Page
A computer program that carries inside it a way to access to the system using it. See also: virus, worm.
A malicious program that is written soley to cause damage or disrupt the normal operation of a computer. They usually have a name that makes them appear to be a useful or important program, that tricks a user into starting them. When the user clicks on the file, it releases its payload.
A type of virus that pretends to be a useful program, such as a game or a utility program, whn in reality it contains special code that will intentionally damage any system onto which it is loaded.
A program or code on a host computer which pretends to do something useful, but carries out secret, unauthorized, and/or damaging tasks which may also compromise the security of the entire system. Technically, Trojan horse refers to something that a user unwittingly installs on his/her computer. _____________________________________________________________________________
An apparently useful and innocent program containing additional hidden code which allows the unauthorized collection, exploitation, falsification, or destruction of data.
A computer virus hidden inside a program. For example AOL4FREE.COM.
A program that is either hidden inside another program or masquerades as something else such as a game or image file.
A program containing additional, hidden code that causes it to launch unauthorized functions, including possible data destruction.
Software that, in addition to its nominal function, secretly performs a second function.
A Trojan horse is a virus that masks itself as a program that appears to be normal, but when opened it can cause damage to the data or security of the system it infects.
Trojan is a program that does something undocumented that the programmer intended, but that some users would not approve of if they knew about it. According to some people, a virus is a particular case of a Trojan, namely one which is able to spread to other programs. According to others, a virus that does not do any deliberate damage is not a Trojan. Finally, despite the definitions, many people use the term "Trojan" to refer only to *non-replicating* malware, so that the set of Trojans and the set of viruses are disjoint.
a subversive group that supports the enemy and engages in espionage or sabotage; an enemy in your midst
a program that appears desirable but actually contains something harmful; "the contents of a trojan can be a virus or a worm"; "when he downloaded the free game it turned out to be a trojan horse"
a large hollow wooden figure of a horse (filled with Greek soldiers) left by the Greeks outside Troy during the Trojan War
a class of program, freely available on the Internet, that serves a function useful to a hacker but is disguised to look exactly like one of Unix's or Windows' legitimate components
a coded program (spyware) that does something undocumented that
a computer program in which a harmful code is embedded in a seemingly harmless program or data file in such a way that it can get control and crash your hard drive or erase data
a computer programs that claims to be one thing, but is actually another
a computer program that carries a hidden virus or worm
a computer program that carries a virus or a worm
a computer program that claims to do one thing but instead does damage when you run it
a computer program that conceals harmful code
a computer program that is hiding a virus or other potentially damaging program
a computer program with an a pp arently or actually useful function that contains additional hidden functions to surreptitiously exploit the legitimate authorizations of the invoking process
a computer term for a malicious piece of software that,
a deceptively labeled program that contains at least one function that is unknown to the user and that harms the user
a destructive computer program that masquerades as a benign application
a disguised group or object that attacks from behind enemy lines
a file that is sent manually and appears to be something good, but when run does something malicious
a form of virus that listens on a specific IP port and waits for commands from the hacker to do any number of functions on the system
a form of virus that zone alarm loopback adapter listens on
a harmful program that disguises itself as a beneficial or neutral program
a harmful program that s hidden inside apparently harmless programs or data
a hidden and/or time detonated program that neither replicates nor copies itself, but causes damage or compromises the security of your computer
a kind of virus that masquerades as a harmless program
a malicious application, which can not spread itself
a malicious computer program masquerading as a normal part of the Windows operating system
a malicious computer program that disguises itself by pretending or appearing to be something that is benign
a method for inserting instructions in a program so that program performs an unauthorized function while apparently performing a useful one
a more clandestine form of monitoring programs on a computer
an application designed to perform an illicit or malicious action, but is disguised as a more benign program
an application that tricks users into thinking it is something
an application which appears to do something useful, yet additionally does something destructive behind your back
a nasty bit of software that looks friendly, and which tricks you into running it
an attack method by which malicious or harmful code is contained inside
an attack on a system that operates by tricking a user into taking a potentially harmful action
an attractive and seemingly harmless program, eg,
an attractive and seemingly harmless program, e
an average computer program
an email virus usually released by an email attachment
an example of malicious code
an executable file, meaning that when you double click on it, for example, it will run the program
an executable program that might look useful or interesting to an unsuspecting user, but are actually harmful when executed
an expression referring to a trick, device or gimmick to give the
an independent program that when called by an authorized user performs a useful function, but also performs unauthorized functions, often usurping the privileges of the user
an innocent looking program with a virus or other damaging program hidden inside
an unprivileged program that collects the privilege of the user running it
a password stealing virus
a piece of code that hides inside another program and performs a concealed function
a piece of software that appears to do something useful, but which actually performs hidden, usually damaging, action on the user's computer
a program Acext that allows a hacker to make changes to your computer
a program containing a damaging function which is covertly
a program disguised as normal program, but actually exists to break security and cause damage in some way
a program hidden inside apparently normal files or software which is introduced to the host system and can be triggered to cause damage or alter information
a program intended to perform some covert and
a program pretending to be something else
a program sent to a computer through an e-mail and can remain behind after the e-mail is deleted to copy or damage files
a program that allows a hac
a program that allows a hacke
a program that allows a hacker a back
a program that allows a h
a program that appears legitimate but contains secondary hidden functions that can (and many times do) cause damage
a program that appears to be a harmless, or sometimes even a helpful application
a program that appears to be a legitimate program but is not
a program that appears to be something it is not
a program that can be attached
a program that disguises itself as another program
a program that disguises itself to gain access to your system and then embeds itself and can control your computer
a program that does not send itself to other people but instead simply resides on a local machine causing damage or compromising that computer's security
a program that does something else that the user thought it would do
a program that does something illicit and unknown to the user in addition to its expected task
a program that does something more than the user expects, and that extra function is damaging
a program that does something that the programmer intended, but the user would not approve of if he knew about it in advance
a program that does something undocumented which the programmer intended, but that the user would not approve of if he knew about it
a program that infects your computer and
a program that initially appears useful or benign and
a program that is an unauthorized, self-contained program that is not self-replicating
a program that is contained inside of another, seemingly desirable, application
a program that is intended to corrupt your computer but has to be activated before it can be executed
a program that masquerades as a game, but it is actually up to something completely different
a program that may state that it does a particular function but rather it creates damage when you operate it
a program that neither replicates or copies itself, but does damage or compromises the security of the computer
a program that on the surface looks like something
a program that performs a desired task, but also includes unexpected functions
a program that performs a hidden function in
a program that performs an undesired yet intended action while, or in addition to, pretending to do something else
a program that performs functions other than those stated in its specifications
a program that pretends to be one thing but in fact contains code to do something else
a program that pretends to do one thing, while sneakily doing something else
a program that pretends to do something useful, but instead does something nefarious
a program that purports to be fun or useful but actually does something nasty
a program that quietly runs
a program that requires human stupidity to do the spreading FOR it
a program that runs, usually invisibly to the user but enables a remote attacker to connect to and control aspects of the infected machine
a program that sounds really cool when you read about it
a program that tricks you into running it by appearing useful or harmless
a program (virus) that does something other than what it is advertised it does or believed to do
a program which appears harmless on the outside, but which carries a hidden virus
a program which appears to be doing something useful,
a program which executes one function secretly while appearing to
a program which has undocumented or unauthorized functions that can cause harm during normal usage by innocent users as well as by criminals
a program which hides itself in another apparently benign program
a program which is built to enter your system and once there, to send information out of your computer to a third party (normally a cracker)
a program which performs other functions in addition to its declared function
a program which seems harmless but secretly plants a worm, virus or backdoor
a program within another pro- gram, usually on a mainframe or a computer running a BBS
a relatively dangerous computer program
a seemingly-harmless software program that
a seemingly legitimate computer program that has been intentionally designed to disrupt and damage computer activity
a segment of code written in a program that was not documented by the original programmer
a software program that claims to be one thing-a game or utility program-but isn't
a special type of virus , designed to look innocent while actually playing havoc with a computer's files
a specific program that destroys information on a hard drive
a standalone program that you are tricked into installing, thinking it is something else
a stand-alone virus that is not attached to any file
a type of code that tricks a computer user into downloading or installing it by masquerading as legitimate software
a type of Computer Virus According to legend, the Greeks won the Trojan war by hiding in a huge, hollow wooden horse to sneak into the
a type of computer virus that pretends to be something else
a type of program that is often confused with viruses
a type of virus that masquerades as a legitimate program but actually contains a payload that can
a type of virus which can damage your pc and the files you store on it
a type of virus which enters a computer system by the sharing of infected program files or when an infected program is downloaded from the Internet
a variety of virus program that can maliciously overwrite code, allow snoops into your computer, and generally ruin your day
a virus when it is additionally designed to replicate, and is called a logic bomb when it is designed to destroy or erase files
a virus which enables an outsider to manipulate your computer in some
a virus which hides inside another file, and relies on the user to replicate it (often masquerading as a joke file or similar to induce replication)
a virus which masquerades as a harmless or common program in order to get the user to provide it with information or to run it
Trojan horses (or simply Trojans) are computer programs that that disguise themselves to be useful software, but instead they compromise your security and privacy. Trojans can allow hackers to take control of your computer or capture your keystrokes. Back to Jump
Program that appears to execute a simple task, but actually executes more sensitive actions at the same time; for instance, a program might play a small film to entertain you, but, at the same time, copy your Outlook address book and send it to a third party (Outlook is especially vulnerable to this kind of problem, which is the reason why we recommend using another mail client, such as the one that comes with Mozilla, for instance).
Program with secret functions in it that surreptitiously access information without the operator's knowledge, usually to circumvent security protections.
A type of computer virus which comes disguised as a program. It usually happens like this: people download a program from the Internet, for example, because they think want it and think it is of some use, but once they start it up, it contains a virus and will erase your hard drive or wreak havoc on your system. A popular Trojan Horse type virus came in the form of a file called AOL4FREE.COM and the "I Love You" virus is another example. The name comes from the Greek legend of a horse that looks benevolent at first, but really holds trouble.
A virus that pretends to be one thing when in fact it is something else. Typically, Trojan horses take the form of a game that deletes files while the user plays.
By analogy with the famous story from the Iliad, a Trojan horse is a program which appears innocuous but has a more sinister function. For example, someone who had access to your account could change your environment such that when you typed 'ls' to get a list of files, it actually removed them, or copied them to a directory where that other user could access them.
Trojan horses are malicious programs disguised as something benign. They have been known to pose as games, utilities, and email attachments. Once opened, Trojan horses act much differently than expected. Some merely annoy users by sending emails to everyone in your address book. Others do serious damage, to the point of stealing passwords and data files. Unlike viruses, Trojan horses are not self-replicating. Active Trojan horses are an advanced type of Trojan horse. They use unprotected ports to open lines of communication with your computer and can ultimately give hackers control over your machine. Active Trojan horses are also called Remote Access Trojans. (Symantec Reference)
A tool used by hackers to gain access to a computer or compromise a computer's security. Adware programs often use Trojans to get into a computer.
an unwanted and unknown instruction in a computer program which performs an unwanted function.
A computer program with (usually undesirable) effects, not described in its specification. Usually a program designed to do things that the user did not intend and disguises its harmful intent. Program often installs itself while the user is making an authorised entry, and is then used to break-in and exploit the system.
A dangerous piece of software that disguises itself as a legitimate application.
Viruses or programs that say they do one thing but really do another.
A virus that portrays itself as something other than a virus upon execution.
A program that causes unexpected and usually undesirable effects when installed or run by an unsuspecting user. These effects may be immediate or wait for some predetermined time or condition before being triggered.
A program that is disguised and installs code that can counteract security or opening access to you computer, thereby letting hackers in. It can also perform other tasks such as gathering identity-information to be abused. The name origins from the Trojan War, where Greek soldiers hid inside a large wooden horse, only to sneak out at night and attack the Trojans from the inside.
A program that purports to do one thing, but actually does another, or carries an extra undesired function. Many viruses are actually Trojan Horses, such as the Melissa virus. Trojan Horses take their name from the ancient Greek legend.
A program masquerading as a harmless application and which often activates in the background. It can transmit information back to a sender, allowing the sender to access and control our computer.
A program that pretends to be legitimate but in fact contains a virus.
A small program that can act like a virus but can't replicate itself. Trojan Horses pretend to be offering you a gift while at the same time containing a malicious hidden agenda.
A malicious program that masquerades as something else.
A seemingly useful and innocent program that contains hidden code that allows the unauthorized modification, exploitation or destruction of data. Trojan horse programs are generally distributed via the Internet. Games, freeware and screen savers are common vehicles for Trojan horses.
A malicious program that pretends to be a useful application; a Trojan horse program purposefully does something the user does not expect. Trojans are not viruses since they do not replicate, but Trojan horse programs can be destructive.
A program that doesn't necessarily replicate itself, but like the legendary wooden horse is much more than it appears. A Trojan horse program might look like a game, but instead it steals your personal information and sends it to a criminal.
A trojan horse, or trojan, as the name implies, secretly carries often-damaging software in the guise of an innocuous program, often as an email attachment. The file name itself is normally misleading to entice you to open it. When the file is opened the trojan horse can do all sorts of things, from erasing files to changing your desktop, or installing a keystroke logger that can monitor every key you type and report back to a hacker.
n. A malicious, security-breaking program that is disguised as something benign, such as a directory lister, archiver, game or (in one notorious 1990 case on the Mac) a program to find and destroy viruses.
A Trojan horse is a program that performs some unexpected or unauthorized (usually malicious), actions while hidden inside an authorized program. Typically it relies on someone sending it to you or downloading the authorized program via the web, it does not email itself, it may arrive in the form of a joke program or software of some sort. Its payload is to do damage to or compromises the security of the computer which enables others remote access to the system to do things such as displaying messages, downloading/erasing files or formatting a disk. A Trojan horse usually doesn't infect other host/system files.
A program that can enter a site on the Internet that seems harmless at first, but can wreak havoc later on computers connected to the network in a fashion similar to a virus or worm.
A software entity that appears to do something normal but which, in fact, contains a trapdoor or attack program.
A destructive program that masquerades as a harmless one. When you run a Trojan horse program, believing that it has a useful function, it will instead, for example, erase your hard drive. The Qaz Trojan infamously infected Micosoft in Nov 2000. Named W32.HLLW. Qaz.A enumerates through the network neighborhood to find computers to infect. When it finds a computer, it infects it by searching for notepad.exe and making the same modifications (renaming notepad.exe to note.com). It does not require any mapped drives to infect other computers. Once the computer is infected, the computer's IP address is emailed to the virus author automatically. The backdoor payload in the virus uses WinSock and awaits connections. This lets a hacker connect to the infected computer and gain access to the computer.
"back door" software program that allow intruders to take remote control of a computer without the owner’s knowledge. Trojans can be installed on computers through thousands of free software packages that can be downloaded from the Internet.
A program with hidden destructive functionality.
Malware that pretends to be something else - an image or a software program. It can't do anything to your computer until you activate it.
An insidious and usually illegal computer program that masquerades as a program that is useful, fun, or otherwise desirable for users to download to their system. Once the program is downloaded, it performs a destructive act.
A computer program that carries within itself a means to allow the program's creator access to the system using it. A Trojan normally will not do any damage by itself.
An apparently harmless program containing a malicious or harmful hidden code used to collect, control and destroy data.
A malicious computer program that appears legitimate but masks a destructive file or application. Unlike viruses, Trojan horses usually do not replicate themselves but can still cause a great deal of damage, such as creating an entryway into your computer for malevolent users.
Malicious programs that are often hidden within legitimate programs and secretly executed when the legitimate program is installed or run on the user's computer.
A program that either pretends to have, or is described as having, a set of useful or desirable features, but actually contains a damaging payload. Most frequently the usage is shortened to "Trojan". Trojan Horses are not technically viruses, since they do not replicate.
A malicious or harmful code contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk.
This refers to a destructive program disguised to look like a useful application. For example, there has been a recent surge in Trojan horse applications posing as anti-spyware utilities. Users think they are downloading a useful utility, when in fact they are exposing their system to attack. Best defense: Antivirus software such as Trend Micro's PC-cillin Internet Security 2004, anti-spyware software.
A malicious computer program is hidden inside another program or that masquerades as something it is not in order to trick unsuspecting users to running it. For example a program that appears to be a game or image that actually performs another function.
A malicious program disguised as legitimate software.
a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage. The term comes from an episode in Homer's Iliad.
Any legitimate appearing software that carries an unwanted destructive payload. Typically the payload is a virus that is used by hackers to gain unauthorised access to computer systems.
Definition: A computer virus embedded within a program.
trojans are not viruses as such, as they do not replicate to make copies of themselves. They are in fact programs that are installed on remote computers and produce no damage (at least not at first), although they may be accompanied by other damaging programs. Trojans are designed to open a back door on the victim machine, which makes it vulnerable to attack from a malicious user. A Trojan Horse masquerades as a legitimate file or program. It sometimes carries a destructive payload.
A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.
A program or utility that falsely appears to be useful program or utility such as a screen saver. However, once installed performs a function in the background such as allowing other users to have access to your computer or sending information from your computer to other computers.
The Trojan Horse is a type of virus in the form of a small program that, disguised as a harmless application running in the background, spies out and then transmits secret information such as passwords to the creator of the Trojan Horse.
Malicious code hidden in other code with the intent of damaging your computer.
is a program that appears legitimate but does something illicit when run. It gets its name from the wooden horse the Greeks gave Troy as a "gift" because users mistake it for a useful or interesting program that they choose to download. Once installed and run, Trojans can secretly open access channels to crackers, relay passwords and credit card data or destroy user files. It's similar to a virus but generally does not replicate itself.
A computer program which carries within itself a means to allow the creator of the program access to the system using it. See also: virus, worm. See RFC 1135.
A computer program that appears to be useful but that actually does damage.
A malicious program that disguises itself as a beneficial or entertaining program but that actually damages a computer or installs code that can counteract security measures (perhaps by collecting passwords) or perform other tasks (such as launching a distributed denial of service attack). Unlike a computer virus, a Trojan horse does not replicate itself.
Like the Trojan horse of mythology, Trojan horse viruses pretend to be one thing when in fact they are something else. Typically, Trojan horses take the form of a game that deletes files while the user plays.
Also just "Trojan". A program that may pretend to have, or is described as having, a set of useful or desirable features, but can actually cause some damage. Trojans are not technically viruses, since they do not replicate. Back to the top
Malicious code that appears harmless but, when executed, can launch a virus or worm.
A malicious, security-breaking program that is disguised as something benign, e.g., a directory lister, archiver, or game
a program that performs like a real program a user may wish to run, but also performs unauthorized actions
A computer program with an apparently or actually useful function that contains additional (hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the detriment of security; for example, making a "blind copy" of a sensitive file for the creator of the Trojan horse.
Computer virus, at first looks benevolent and useful, but really holds trouble.
A program that appears to be useful but actually causes damage in some form. The goal of a Trojan Horse is to trick users by hiding the underlying activity. Page top
Trojan horse secretly carries often-damaging software in a "plain wrapper." The plain wrapper is normally an e-mail file attachment from someone you may or may not know.
Trojan Horses are impostors--files that claim to be something desirable but, in fact, are malicious. A very important distinction between Trojan horse programs and true viruses is that they do not replicate themselves. Trojans contain malicious code that when triggered cause loss, or even theft, of data. For a Trojan horse to spread, you must, invite these programs onto your computers--for example, by opening an email attachment or downloading and running a file from the Internet. Trojan.Vundo is a Trojan.
an apparently innocuous program that contains code designed to surreptitiously access information or computer systems without the user's knowledge
A virus-like computer program that appears harmless and benign but is actually malicious in nature. Trojan Horses can act immediately or lay dormant for protracted periods before wreaking havoc. Anti-virus programs can detect many Trojan Horses - although, unlike viruses, they do not actually replicate.
A program that falsely appears to be useful, but once installed gathers background information allowing others to have access to your computer and send information about your computer to other computers.
A program that appears to be useful or harmless but that contains hidden code designed to exploit or damage the system on which it is run. Trojan horse programs are most commonly delivered to users through e-mail messages that misrepresent the program's purpose and function. Also called Trojan code.
A destructive program that masquerades as a benign application. Unlike viruses Trojan horses do not replicate themselves but they can be just as destructive.
An unauthorized program hidden inside a legitimate program, usually doing some harm to the computer system while the host program appears to be performing normally.
You have heard about the story of the wooden horse built by the Greeks to sack the cities of Troy. A Trojan Horse is a program usually downloaded from the internet. As in the Wooden Horse it sneaks into your PC and when activated it can carry out tasks like erasing your hard disk which wipes out your system. A Trojan horse cannot continue to spread very far since it can be identified quickly according to its destructive nature. Note it's different from viruses since it can not replicate itself.
A malicious software program ( malware) that appears to be useful, such as a game or utility program while hiding its real purpose of causing harm to your computer.
These programs disguise themselves as benign programs and cannot replicate. While some Trojan horse programs claim to rid computer systems of viruses, they actually infect the system with a virus.
A program that pretends to be a something it is not. Trojan programs are used to steal user information from a PC and can even be used to take control of the PC remotely.
A type of infestation that hides or disguises itself as a useful program yet is designed to cause damage at a later time.
A masked program that tricks potential users into running it by posing as another program, game or image file.
a seamingly useful program that contains malicous code
A computer program that allows hackers unauthorised access to your computer.
A Trojan Horse is not a virus and does not reproduce. It is a program intended to perform some action, usually malicious, which the victim did not expect and want.
A virus program disguised as a legitimate program. A Trojan horse does not replicate itself but depends on its users to spread. It’s often a game or utility that seems to do one thing but has incorporated within itself another, secret function that will cause damage, pass on information about your computer, or enable its sender to hijack your computer. Trojan horses are often part of hybrid or multipartite viruses. For instance a Trojan Horse may be “planted” in an application by a worm or it may incorporate a virus within itself.
A malicious security-breaking program that is disguised as something benign, such as a screen saver, or a virus scanner.
A destructive program which is either hidden inside another program or masquerades as something it is not in order to trick potential users into running it. Unlike viruses, Trojan horses do not infect other programs, but they can be just as destructive. One type of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer
A program which outwardly appears to perform a useful task while covertly performing other (usually malicious) tasks.
Much like the myth it was named after, a Trojan horse is a malicious piece of computer code disguised as something desirable. For example, a user may download a file from the Internet that appears to be a computer game or screen saver but which actually contains harmful computer code like a virus or worm. TechSupport's network monitoring and security defends computer networks against Trojans.
Named after the wooden horse used by the Greeks to infiltrate Troy. ATrojan Horse is a program that does something undocumented (hidden) that the user would not approve of (such as stealing passwords). Many people use the term "Trojan" only for a non-replicating malicious program (as opposed to macro-viruses and worms).
A computer program is either hidden inside another program or that masquerades as something it is not in order to trick potential users into running it. For example a program that appears to be a game or image file but in reality performs some other function. The term "Trojan Horse" comes from a possibly mythical ruse of war used by the Greeks sometime between 1500 and 1200 B.C. A Trojan Horse computer program may spread itself by sending copies of itself from the host computer to other computers, but unlike a virus it will (usually) not infect other programs. What we achieve: Glossary of terms Please select the first letter of your subject Or select our search function search for subjects License
A Trojan Horse is a harmful program hidden under the shield of another program. A Trojan Horse may delete program files or other data from one's computer.
(AKA Trojan, Backdoor) Trojan Horses pretend to be a program for doing something useful but they are made by hackers to open your PC to attacks. The name comes from the story of the Trojan War. The Greeks give a big wooden horse to the Trojans as a peace offering. However, it was a cunning plan by the Greeks. Greek soldiers hid inside the hollow belly of the wooden horse and waited for the Trojans to take the wooden horse into the castle. At night, they snuck out and opened the gates of the Trojan's castle allowing the Greek army to invade and destroy the Trojans.
Any program designed to do things that the user of the program did not intend to do. An example of this would be a program which simulates the logon sequence for a computer and, rather than logging the user on, simply records the user's userid and password in a file for later collection. Rather than logging the user on (which the user intended), it steals the user's password so that the Trojan Horse's designer can log on as the user (which the user did not intend).
A program or system with benign appearance and malicious intent.
Also called a logic bomb, it is often mistaken for a virus. This program appears to be useful and harmless but has harmful side effects such as destroying data or breaking security on the system on which it is run. The side effect is triggered by an event such as the clock reaching a certain date. This program cannot propagate itself, therefore is not a virus.
A malicious computer program (often a virus) that is either hidden inside another program or that masquerades as something it is not in order to trick users into running it.
These programs disguise themselves as friendly programs and infect the system with a virus, often to allow others access to the infect computer.
The vehicle used by the attacker to persuade the user to run the payload. A typical example is an email with an attachment that appears to be an image file but is actually an executable, or a URL that appears to go to a legitimate site but actually takes the user somewhere else.
An independent program that appears to perform a useful function but that hides another unauthorized program inside it. When an authorized user performs the apparent funciton, the Trojan horse performs the unauthorized function as well (often usurping the privileges of the user).
A Trojan Horse is a seemingly-innocent program that contains and conceals harmful code. When a Trojan Horse is opened, the malicious code performs its damage on the unsuspecting computer.
A program that appears to be legitimate but contains in its code instructions that cause damage to the systems on which it runs.
a malicious software program that is disguised as something benign, like a video clip. Once surreptitiously installed, it can inflict significant damage on a victim's computer.
A seemingly harmless computer virus that turns out to be extremely destructive.
Malicious-logic program that hides within or looks like a legitimate program. A certain condition or action triggers the Trojan horse. 12.4
A program that masquerades as another common program in an attempt to receive information. An example of a Trojan horse is a program that behaves like a system logon to retrieve user names and password information that the writers of the Trojan horse can later use to break into the system.
A program that appears legitimate but performs illicit activities when executed. For example, it may expose passwords stored on the system or destroy files located on a hard drive. One common Trojan horse is NetBus.
A Trojan Horse or simply a trojan is a computer program that is either hidden inside another program or that masquerades as something it is not in order to trick potential users into running it. For example a program that appears to be a game or image file but in reality performs some other function. A trojan may spread itself by sending copies of itself from the host computer to other computers.
A Trojan horse is a program that appears harmless, but hides a virus that can compromise the security, data and functions of your computer.
n. A destructive program disguised as a game, utility, or application. When run, a Trojan horse does something harmful to the computer system while appearing to do something useful. See also virus, worm.
Like the Trojan horse of mythology, Trojan horse viruses hide inside another program. They are activated when you use the program they are hidden in.
A computer program with an apparently or actually useful function that contains additional (hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the detriment of security. See also: Malicious Code. Threat agen
A type of virus or method or hacking that disguises itself to get access to your system or to get you to run it. The Melissa virus a few years ago was of this type as was the doomsday virus. ( It disguises itself as a document and entices people to open, mostly out of curiosity, and then run the virus program).
1) Any program designed to do things that the user of the program did not intend to do or that disguises its harmful intent. 2) Program that installs itself while the user is making an authorized entry; and, then are used to break-in and exploit the system.
A computer program which carries within itself a means to allowthe creator of the program access to the system using it. Seealso: virus, worm. See RFC 1135. TRUNCATION
Trojan Horse refers to malicious programs or software code hidden inside what looks like a normal program. When a user runs the program, the hidden code runs as well and can start deleting files or collecting information and sending it out to the Internet.
Like the Trojan horse of mythology, a Trojan horse virus pretends to be one thing when in fact it is something else.
is a destructive program that unlike viruses does not replicate, but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer
The Trojan Horse is part of the myth of the Trojan War, as told in Virgil's Latin epic poem The Aeneid. The events of this myth take place after Homer's Iliad, and before both Homer's The Odyssey and Virgil's The Aeneid.