One who shows the pluck, endurance, determined energy, strength, or the like, attributed to the defenders of Troy; -- used chiefly or only in the phrase like a Trojan; as, he endured the pain like a Trojan; he studies like a Trojan.
are impostor files that claim to be something desirable but are actually malicious. Trojan horse programs do not replicate themselves. They contain malicious code that causes loss, or even theft, of data when triggered
A trojan is a program that neither replicates or copies itself, but does damage or compromises the security of the computer; it's used to break into the host computer. It is a program in which instructions are contained inside another file.
A Trojan horse, as the name implies, secretly carries often-damaging software in the guise of an innocuous e-mail attachment. The file attachment name itself is normally misleading to entice you to open it. When the attachment is opened the program can do all sorts of things, from erasing files to changing your desktop. It then sends itself along to other people in your address book so that it can propagate itself.
(Trojan Horse) A program or a part of program code that performs unexpected or unauthorized, often malicious, actions. The main difference between a trojan and a virus is the Trojan's inability to replicate. Trojans cause damage, unexpected system behavior, and compromise the security of systems, but do not replicate. If a malicious program replicates, then it should be classified as a virus. A Trojan, coined from Greek mythology's Trojan Horse, typically comes in good packaging but has some hidden malicious intent within its code. When a Trojan is executed users will likely experience unwanted system errors, problems in operation, and sometimes loss of valuable data.
Like the fabled gift to the residents of Troy, a Trojan Horse is an application designed to look innocuous. Yet, when you run the program it installs a virus or memory resident application that can steal passwords, corrupt data, or provide hackers a back door into your computer. Trojan applications are particularly dangerous since they can often run exactly as expected without showing any visible signs of intrusion.
A Trojan is a program made to appear harmless in order for users to be duped into installing it, or is installed without their knowledge. Updater A component of F-Prot Antivirus that handles the virus signature file updates and software upgrade. Virus A virus is a piece of programming code, usually disguised as something else, that causes some unexpected and usually undesirable event. A virus is often designed so that it is automatically spreads to other computer users. Viruses can be transmitted as attachments to e-mail messages, as downloads, or be present on a diskette or CD. The person from whom the e-mails appear to be sent, or from whom the downloaded files or diskettes originate, is often unaware of the virus. Some viruses wreak their effect as soon as their code is executed; other viruses lie dormant until circumstances cause their code to be executed by the computer. Some viruses are playful in intent and effect ("Happy Birthday, Ludwig!") and some can be quite harmful, erasing data or causing your hard disk to require reformatting.
A Trojan Horse is a hidden and/or time detonated program that neither replicates nor copies itself, but causes damage or compromises the security of your computer. To check if your computer has been infected with trojans click here to download free detection software.
The term Trojan Horse is derived from the Iliad and describes a program that pretends to have a certain (desirable) function. In addition, though, trojans contain a secret program part that opens a back door to the infected system and thus offers almost complete access to it, without the user being aware of the fact. The methods used by trojans to hide themselves are almost unlimited, and often these malicious programs are emailed as screen savers or games. Just launching them once is enough to infect the system.
Beware of Greeks bearing gifts ! A Trojan is malicious software hidden inside a tempting and seemingly innocuous file. This tactic is used to get a user to run malware on their machine for the attacker. The Trojan, since executed by the victim on their computer, is now able to open other holes which allow the attacker to gain control of the victim's computer. Trojans are commonly distributed by e-mail with catchy file names, or text that ask the victim to see the contents of the attachment. There are freely available tools on the Internet that anyone can download and use.
Any program with a hidden intent. Trojans are one of the leading causes of breaking into machines. If you pull down a program from a chat room, new group, or even from unsolicited e-mail, then the program is possibly trojaned with some subversive purpose. The word Trojan can be used as a verb: To trojan a program is to add subversive functionality to an existing program. For example, a trojaned login program might be programmed to accept a certain password for any user's account that the hacker can use to log back into the system at any time. Root kits often contain a suite of such trojaned programs. Highly unethical and strictly illegal within out network.
A file that hides a worm or virus and can be received through the email disguised in a file such as a JPEG (picture). When you open the JPEG, a code is executed and it does the same as the worm and virus listed above.
Trojans are emails that look innocent, but may contain links or attachments that can install harmful programmes on to your computer when you click on them. These programmes are designed to do things like ‘keystroke logging', which could enable fraudsters to get a hold of your personal information while you are using the Internet. Trojans are named after the Wooden Horse of Troy – in ancient times, it was a gift that contained a harmful code. View our trojan demonstration. While we may email you from time to time, we will never send you emails with attachments, or ask you for your Internet banking information or direct you to log on to Internet banking. If you receive an email from an unknown source, or an email that contains unknown attachments or links, do not open the attachments or click on the links. Instead, delete all suspicious emails. Popular anti-virus software such as Zone Labs' ZoneAlarm Internet Security Suite, McAfee Virus Scan, Norton AntiVirus, or Sophos Anti-Virus can help to protect your computer from the latest Trojans.
A Trojan Horse is a program intended to perform some covert and usually malicious act which the victim did not expect or want. It differs from a destructive virus in that it doesn't reproduce, (though this distinction is by no means universally accepted).
Trojans or often called backdoors are programs which will most be sent via email, instant-messengers or filesharing-tools. If you run a trojan file it will install itself on your computer to get run every time you boot up your machine. Trojans opens a port (channel) on your system which can be used by an attacker to connect to your computer. Trojans can enable almost everything for an attacker to do harmful things like viewing/modifying/deleting data, watching you when you are working or surfing the web, etc. Depending on the trojan there can be thousands of functions built in which can be remotely used by any attacker to spy you.
240\240\240\240\240\240\240\240\240\240\240 A program represented to do one thing while actually doing something else. Typically, a trojan will be presented as a movie or a sound file that actually installs a back door in the system.
Unwanted software which runs in a user's machine, as an agent of the attacker, without user awareness. Unlike viruses and worms, trojans do not replicate (make copies of themselves.) We classify some pests simply as "Trojan". Others are more precisely classified as ANSI Bomb, AOL Pest, Annoyance, DDoS, Dialer, DoS, Dropper, Hostile ActiveX, Hostile Java, Hostile Script, Key Logger, Loader, Password Capture, RAT, Spyware, Trojan, War Dialer, and Worms. Examples • Most Common • Annual Growth
A virus that is concealed within an apparently innocuous package, which executes when the package, for example a .jpg file, is opened. The most commonly encountered Trojans contain payloads designed to seize control of aspects of device/network performance.
A form of virus. Once on a computer, Trojan programs run in the background deleting files or scrambling their contents. Alternatively, they can allow the computer to be controlled remotely, giving someone else access to files and applications.
A program which is usually given away for free which has a hidden purpose. It may be some type of file such as a video that user\'s may be interested in. The user would normally install and run this program although the installation would be so simple the user would be unaware of it. This program may or may not use a vulnerability to spread. It will usually lie dormant until the creator gives it instructions. It may be used to gain unauthorized access to a computer system.
A Trojan also known as Trojan horse is a program that looks legit, but actually is not. Trojans are usually attached to files popularly shared online, and when these files are run, the Trojan program can have many destructive effects. A Trojan programs does not replicate itself, it tries to modify setting on the computer its on to allow itself to exist for malicious purposes. Some of the effects of Trojans are opening backdoors on the system giving access to hackers as well as capture credit card information, passwords, email address, keystroke logging, using your computer to launch attacks.
(Trojan horse) A program that, when installed on a computer allows a remote person/computer to control the zombie computer to either directly attack the computer/data it stores or to atack other computers via the network (internet). One such way of attacking other computers is via a Denial of Service attack (DoS), sending spam email or directly breaking into another computer. In the last case, the zombie computer is used to "cover their tracks" and to attempt to hide where the attack truly came from.
This term refers to software which once installed and run on your computer performs malicious tasks or replicates. Usually this software is either hidden in legitamite software that you install or is installed by legitamite software on your computer without your permission. Either way this software is a virus hidden in legitamite software.
An undesirable computer program that is either hidden inside another program or that pretends to be something it is not in order to trick potential users into running it. For example a program that looks by its name to perhaps be a picture file but when clicked on, does something entirely different. Often recieved as an attachment to an email.A Trojan program may spread itself by sending copies of itself to all the contacts in an address book.
Trojans, also called trojan horses, can be well comparend to the greek myth of troja. Analogous to the tale a trojan infects a system and makes use of this situation. It sends out passwords by email or lets the attacker remote control the system.
A computer program that appears to perform a valid function but contains, hidden in its code, instructions that cause damage to computer systems. Strictly speaking, Trojan Horses are not viruses because they do not replicate.
A Trojan (horse) is an "apparently useful program containing hidden functions that can exploit the privileges of the user [running the program], with a resulting security threat. A Trojan horse does things that the program user did not intend" Trojan horses rely on users to install them, or they can be installed by intruders who have gained unauthorised access by other means. Then, an intruder attempting to subvert a system using a Trojan horse relies on other users running the Trojan horse to be successful.
A malicious program that usually installs itself onto a computer without the userâ€(tm)s knowledge and can cause a great deal of damage. Trojans are often attached to legitimate programs received on an e-mail and, once activated, can allow other people to gain access to the files on the infected computer.
"Trojan horse"; a reference to the story of the Trojan War, a piece of malware (such as a virus program) contained within a legitimate program. The purpose of the Trojan can be wide, but the distribution approach is to attempt to have the user willingly install the host program to gain access to the victim's computer.
A Trojan is a harmful program disguised as authentic software to deceive the user into opening it. It may appear to be an image or game. It spreads from the userâ€™s computer to other computers by sending copies of itself. It usually doesnâ€™t affect other programs like a virus.
Used by both Spyware and Viruses. A trojan is a small, invisible program that gets installed on your computer and then does something you won't like, such as sending out emails to everyone in your address book, or stealing your credit card number and secretly sending it to the thief who is using the trojan. The term refers to the "trojan horse" used by the citizens of Troy to invade and conquer a neighboring city by presenting an apparent "gift" (a large statue of a horse) which was hollow and full of soldiers who snuck out and conquered the city.
It "is a piece of unauthorized code hidden within a legitimate program (101)." Trojans can carry viruses and other programs that may damage your computer once you run the program that the trojan is hidden in. Trojan horses may be either simple batch files or code containing redirected escape sequences intercepted by the ANSI.SYS driver.
A Trojan horse is a program that allows a hacker to control your computer. Unlike a virus, a Trojan is not designed to replicate itself. It is generally disguised as a harmless software program and distributed as an e-mail attachment or free download. Once you open the file, the Trojan may install itself on your computer without your knowledge or consent. It has the ability to control files on your computer, including creating, deleting, renaming, viewing, or transferring them to or from your computer. It may allow the hacker to install, execute, open, or close software programs. They have the ability to run in the background, hiding their presence.
Software which is seemingly harmless, but is actually malicious in nature. Trojans rely on the user of a computer to download and install them. They may monitor or alter the use of the computer, and may accidentally or deliberately damage or cause problems on the infected computer.
A secret undocumented routine embedded within a useful program. Execution of the program results in the execution of the secret routine, usually opening a backdoor into your computer's operating system for a hacker to misuse.
A Trojan is a computer program, or part of a programs code, that disguises itself as a useful software application that is used to gain access, or change settings on your computer. It takes its name after the Trojan horse used to infiltrate Troy.
A program that is disguised as a useful program or hidden inside another program to get you to install it. Many trojans are Remote Access Tools (RATs). A RAT trojan can give a remote user administrative privileges, and allow him or her full access to and control over your computer. Many Trojans have built-in tools, including tools to manage files (upload, download, and run executables on your computer), control your computer, and retrieve your passwords, log your keystrokes, capture your screens, etc..
A piece of Malware which hides malicious or harmful code by disguising it as a useful or desirable utility, game or toy. Trojans are normally used to open a back door onto a computer so it can be controlled remotely.
Like the Trojan Horse in Greek mythology, Trojan programs are tiny little programs hidden inside larger regular programs. Like the Trojan warriors, these tiny programs are often hidden there to do nasty things to your computer, like erasing files.
A destructive computer virus that masquerades as a benign application. A trojan can be used to record keystrokes, view screen contents etc. It may also allow your PC to be remotely controlled by a computer hacker.
A program which masquerades as something it is not in order to gain unauthorised access to a PC. Usually a piece of malicious code contained in another seemingly harmless program. Derived from ancient Greek author Homer's renowned epic, the Iliad which relates the story of how the Greeks won the Trojan war by concealing their warriors in a huge, hollow wooden horse.
A Trojan is a piece of data which appears desirable on the outside but actually contains another, more harmful, piece of malware. See here if you believe you may have a trojan on your computer. See also Malware.
Named after the Trojan horse used by the rescuers of Helen of Troy. A Trojan is a computer program that disguises itself as a useful software application that is actually used to gain access to your computer. They fall into two categories 1. Time Bombs A Trojan will activate itself on a particular date. It finds the date when it is loaded into memory, as the computer has to keep a record of the date in memory to function. 2. Logic Bombs Logic bombs are triggered off by a particular sequence of events or conditions, for example; a key combination, number of files on a disk
An apparently useful and innocent program containing additional hidden code, which allows the unauthorized collection, exploitation, falsification, or destruction of data. It is an executable program that is disguised as something innocuous such as a game, amusement, or common system command. Once executed it can install services or modify the system to allow an attacker access to the host. Examples of trojans are Back Orifice, NetBus, and SubSeven.
A program which appears to offer some benefit to the user, but which covertly does something else. The name originates from Greek mythology and the siege of Troy, but were unable to break through its defences until they hid some forces inside a gift, (Trojan Horse) that was taken into the city.
A Trojan is a computer virus. It can be attached to emails, downloaded from websites or hidden inside other downloadable files such as illegal movies or MP3 files. Typically, fraudsters will send out emails at random to try to get you to click on a link from the email and visit a fake website where the Trojan is installed. A fraudster can build a Trojan with a number of different purposes in mind, but the ones that affect Internet Banking are the ones that attempt to find out your security details. They can do this by capturing keystrokes or taking screen shots. If a Trojan is downloaded onto your computer, it could capture your password and other log in details and then 'send them home' to the fraudster - wherever they might live in the world. Anti-virus software can identify Trojans and remove them from your computer.
Much like the myth it was named after, a Trojan horse is a malicious piece of computer code disguised as something desirable. For example, a user may download a file from the Internet that appears to be a computer game or screen saver but which actually contains harmful computer code like a virus or worm. TechSupport's network monitoring and security defends computer networks against Trojans.
Trojans are programs (often malicious) that install themselves or run surreptitiously on a victims machine. They do not install or run automatically, but may entice users into installing or executing by masquerading as another program altogether (such as a game or a patch) or they may be packaged with hacked legitimate programs that install the trojan when the host program is executed. ...
A sort of virus although it does not replicate itself – it is something which is hidden in a file and, when activated, it does terrible damage … like a Friday 13th thingy – obviously named after the Trojan Horse.
An object orbiting in the Lagrange points of another (larger) object. This name derives from a generalization of the names of some of the largest asteroids in Jupiter's Lagrange points. Saturn's moons Helene, Calypso and Telesto are also sometimes called Trojans.
In astronomy, the adjective Trojan refers to asteroids or moons that share the same orbit as a larger planet or moon, but does not collide because it orbits within one of the two Lagrangian points of stability, L4 and L5, which results in it always orbiting 60Â° ahead of or behind the larger object.
Trojan, known as Tatakai no Banka(é—˜ã„ã®æŒ½æŒ) or "Requiem for War" in Japan, is a 2D, side scrolling video game similar to Tiger Road, or Kung Fu. It was developed by Capcom and released in the United States in 1986 by Romstar. The game was most recently included as part of the Capcom Classics Collection for the Play Station 2 and Xbox.