a program that allows someone to enter into your computer and run it one form or another without you knowing it
A computer program that contains hidden functions that exploit the user's privileges with a resulting security threat. It can allow intruders easy access to the computer without the user's knowledge, change system configurations and can infect the computer with a virus.
A Trojan (or Trojan Horse) is a program which carries out an unauthorized function while hidden inside an authorized program. It is designed to do something other than what it claims to, and frequently is destructive in its actions.
As the name suggests, Trojans can be hidden in an innocent piece of software or an email. Trojans are used by fraudsters to gain access to a user's PC and record their activities on the internet without their knowledge. Information such as personal sign-in details for online banking can potentially be recorded and then be used to access online bank accounts fraudulently. You may also hear the terms 'key logging software' or 'spyware' - these are types of Trojans (see Viruses and malware for more details).
Software programs devised by professional hackers to detect activity on PC's allowing the hacker to assume the user's identity.
Nasty virus like attachments which can be merged with executable files. These are tiny so are unlikely to arouse suspicion. When run they allow a hacker to access your computer and wreak havoc. Can occasionally be found in warez files.
Like spyware, Trojans (also known as Trojan horses) can slip into your computer system and run without your knowledge. They are capable of possessing a variety of functions. For example, some Trojans use your computer's modem to dial long-distance or toll numbers (like a dialer), potentially generating expensive phone bills. Unlike viruses and worms, Trojans do not replicate themselves.
Trojans or Trojan Horses get into your system and run without your knowledge. They can have many functions. For example, some use a computer's modem to dial long-distance, resulting in enormous phone bills. Unlike viruses and worms, Trojan horses do not make copies of themselves. They can be delivered to your system via shareware or freeware, or via worms and viruses.
Programs that, when installed on your computer, enable unauthorized people to access it and sometimes to send spam from it.
Trojans or a Trojan horse is a type of computer virus, which can be installed on your computer without you realising. Trojans are sometimes capable of installing a "keystroke logger", which captures all of the keys you press on your computer keyboard.
Trojan is a malware that conceals itself in a legitimate program. A person can plant a Trojan on your PC and then access your passwords, credit card numbers and other information stored on it. Trojans can also be used to spy on you through your chat and instant message programs, Web cam or microphone. However, they cannot replicate themselves.
Programs designed to allow third parties unauthorized access to the computer systems they infect. Trojans may also be used in order to exploit a computer system to send unsolicited email.