The Trojan Horse is a story from the Trojan War about the subterfuge that the Greeks used to enter the independent city of Troy and win the war. In the canonical version, after a fruitless 10-year siege, the Greeks constructed a huge wooden horse and hid a select force of men inside, including Odysseus.
They work the same way the ancient Trojan horse did: Once they're installed, the program will infect other files throughout your system and potentially wreak havoc on your computer. They can even send important information from your computer over the Internet to the developer of the virus . The Trojan horse virus acts and looks like a regular computer program when it’s actually a malicious piece of malware. That’s why a lot of people fall for it unknowingly. The problem with a Trojan horse virus is that it often seems innocent and you won’t notice its true motives or intentions until it’s too late. Trojan horse virus also called trojan may be defined as the malware which appears to be the legitimate or appropriate software and used by attackers to compromise the security of the system. There are several things that a trojan can do and one of its important features is, it remains in the user’s system secretly and does not let them find it. A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. A Trojan acts like a bona fide application or file to trick you. In computer security, a Trojan horse is a type of malware that can wreak havoc on computer networks. Unlike a virus, which relies on a host program to spread itself, a Trojan relies on unwitting Dec 10, 2019 · A Trojan will hide within seemingly harmless programs, or will try to trick you into installing it. Unlike viruses, Trojans do not self-replicate by infecting other files or computers. Rather, a Trojan is the decoy horse, ushering in other malicious software (malware), giftwrapped to hide its nefarious intent. Trojans survive by going unnoticed.
Jan 17, 2008
Mar 09, 2016 · Why it is called Trojan Horse? How to save your PC from such viruses and malware? Here's everything you need to and should know. Give Thumbs Up. Subscribe for more Updates. In Reply to: Working like a trojan posted by Barbara on February 05, 2001 : Does anyone know the origin and/or meaning of "working like a trojan"? WORK LIKE A TROJAN - "Trojan originally referred to the inhabitants of Troy, the ancient city besieged by the Greeks in their efforts to retrieve their queen, Helen, who had been abducted by the son A Trojan horse virus pretends to be a legitimate program. In that case, a Trojan horse virus can take the form of a free gaming software. Sharing illegal game downloads through peer-to-peer networks is a sure way to get a Trojan horse virus as it exploits your desire to get a licensed game for free.
Jan 24, 2019
Definition of a Trojan horse in the Idioms Dictionary. a Trojan horse phrase. What does a Trojan horse expression mean? Definitions by the largest Idiom Dictionary. What Is a Trojan Virus? Dec 07, 2019 How does a computer Trojan horse work? | AnswersDrive Trojan horse (computing) In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.The term is derived from the Ancient Greek story of the deceptive wooden horse that led to the fall of the city of Troy.