a program that behaves like a system logon to retrieve user names and password information that the writers of the Trojan horse can later use to break into the system
a program that masquerades as a system logon to retrieve user names and password information, so that the writers of the Trojan horse can use them later to gain unauthorized access into the computer
a program that masquerades as a system logon to retrieve user names and password information, which the writers of the Trojan horse can use later to break into the system