Of or pertaining to ancient Troy or its inhabitants.
A native or inhabitant of Troy.
One who shows the pluck, endurance, determined energy, strength, or the like, attributed to the defenders of Troy; -- used chiefly or only in the phrase like a Trojan; as, he endured the pain like a Trojan; he studies like a Trojan.
a program designed to allow it unauthorised access to the computer systems it infects. Trojans may also be used in order to exploit a computer system to send unsolicited e-mails.
are impostor files that claim to be something desirable but are actually malicious. Trojan horse programs do not replicate themselves. They contain malicious code that causes loss, or even theft, of data when triggered
A trojan is a program that neither replicates or copies itself, but does damage or compromises the security of the computer; it's used to break into the host computer. It is a program in which instructions are contained inside another file.
A malicious application that hides itself in a seemingly innocent program. It may be distributed as part of a virus.
A Trojan horse, as the name implies, secretly carries often-damaging software in the guise of an innocuous e-mail attachment. The file attachment name itself is normally misleading to entice you to open it. When the attachment is opened the program can do all sorts of things, from erasing files to changing your desktop. It then sends itself along to other people in your address book so that it can propagate itself.
a program in which malicious code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form...
(Trojan Horse) A program or a part of program code that performs unexpected or unauthorized, often malicious, actions. The main difference between a trojan and a virus is the Trojan's inability to replicate. Trojans cause damage, unexpected system behavior, and compromise the security of systems, but do not replicate. If a malicious program replicates, then it should be classified as a virus. A Trojan, coined from Greek mythology's Trojan Horse, typically comes in good packaging but has some hidden malicious intent within its code. When a Trojan is executed users will likely experience unwanted system errors, problems in operation, and sometimes loss of valuable data.
Like the fabled gift to the residents of Troy, a Trojan Horse is an application designed to look innocuous. Yet, when you run the program it installs a virus or memory resident application that can steal passwords, corrupt data, or provide hackers a back door into your computer. Trojan applications are particularly dangerous since they can often run exactly as expected without showing any visible signs of intrusion.
A Trojan is a program made to appear harmless in order for users to be duped into installing it, or is installed without their knowledge. Updater A component of F-Prot Antivirus that handles the virus signature file updates and software upgrade. Virus A virus is a piece of programming code, usually disguised as something else, that causes some unexpected and usually undesirable event. A virus is often designed so that it is automatically spreads to other computer users. Viruses can be transmitted as attachments to e-mail messages, as downloads, or be present on a diskette or CD. The person from whom the e-mails appear to be sent, or from whom the downloaded files or diskettes originate, is often unaware of the virus. Some viruses wreak their effect as soon as their code is executed; other viruses lie dormant until circumstances cause their code to be executed by the computer. Some viruses are playful in intent and effect ("Happy Birthday, Ludwig!") and some can be quite harmful, erasing data or causing your hard disk to require reformatting.
A Trojan Horse is a hidden and/or time detonated program that neither replicates nor copies itself, but causes damage or compromises the security of your computer. To check if your computer has been infected with trojans click here to download free detection software.
The term Trojan Horse is derived from the Iliad and describes a program that pretends to have a certain (desirable) function. In addition, though, trojans contain a secret program part that opens a back door to the infected system and thus offers almost complete access to it, without the user being aware of the fact. The methods used by trojans to hide themselves are almost unlimited, and often these malicious programs are emailed as screen savers or games. Just launching them once is enough to infect the system.
Beware of Greeks bearing gifts ! A Trojan is malicious software hidden inside a tempting and seemingly innocuous file. This tactic is used to get a user to run malware on their machine for the attacker. The Trojan, since executed by the victim on their computer, is now able to open other holes which allow the attacker to gain control of the victim's computer. Trojans are commonly distributed by e-mail with catchy file names, or text that ask the victim to see the contents of the attachment. There are freely available tools on the Internet that anyone can download and use.
Any program with a hidden intent. Trojans are one of the leading causes of breaking into machines. If you pull down a program from a chat room, new group, or even from unsolicited e-mail, then the program is possibly trojaned with some subversive purpose. The word Trojan can be used as a verb: To trojan a program is to add subversive functionality to an existing program. For example, a trojaned login program might be programmed to accept a certain password for any user's account that the hacker can use to log back into the system at any time. Root kits often contain a suite of such trojaned programs. Highly unethical and strictly illegal within out network.
A file that hides a worm or virus and can be received through the email disguised in a file such as a JPEG (picture). When you open the JPEG, a code is executed and it does the same as the worm and virus listed above.
Trojans are emails that look innocent, but may contain links or attachments that can install harmful programmes on to your computer when you click on them. These programmes are designed to do things like ‘keystroke logging', which could enable fraudsters to get a hold of your personal information while you are using the Internet. Trojans are named after the Wooden Horse of Troy – in ancient times, it was a gift that contained a harmful code. View our trojan demonstration. While we may email you from time to time, we will never send you emails with attachments, or ask you for your Internet banking information or direct you to log on to Internet banking. If you receive an email from an unknown source, or an email that contains unknown attachments or links, do not open the attachments or click on the links. Instead, delete all suspicious emails. Popular anti-virus software such as Zone Labs' ZoneAlarm Internet Security Suite, McAfee Virus Scan, Norton AntiVirus, or Sophos Anti-Virus can help to protect your computer from the latest Trojans.
A Trojan is a malicious program that is loaded onto your computer, via various means, that allows hackers to have access to your system. Return
A Trojan Horse is a program intended to perform some covert and usually malicious act which the victim did not expect or want. It differs from a destructive virus in that it doesn't reproduce, (though this distinction is by no means universally accepted).
Trojans or often called backdoors are programs which will most be sent via email, instant-messengers or filesharing-tools. If you run a trojan file it will install itself on your computer to get run every time you boot up your machine. Trojans opens a port (channel) on your system which can be used by an attacker to connect to your computer. Trojans can enable almost everything for an attacker to do harmful things like viewing/modifying/deleting data, watching you when you are working or surfing the web, etc. Depending on the trojan there can be thousands of functions built in which can be remotely used by any attacker to spy you.
A program that masks itself as another in order to gain access to your computer and give another user control over it.
240\240\240\240\240\240\240\240\240\240\240 A program represented to do one thing while actually doing something else. Typically, a trojan will be presented as a movie or a sound file that actually installs a back door in the system.
A destructive programme which manifest as a benign application
not a virus. A 'Trojan' is a program that pretends to do something useful or 'fun' whilst it is (secretly) doing damage to your files or system. U - Z
Horse A computer program that appears to be useful but that actually does damage.
a native of ancient Troy
a program that appears desirable but actually contains something harmful; "the contents of a trojan can be a virus or a worm"; "when he downloaded the free game it turned out to be a trojan horse"
of or relating to the ancient city of Troy or its inhabitants; "Trojan cities"
a backdoor program that is used by a hacker to allow him to gain control of a machine
a benign destructive program that hides as an application
a bit different to a Virus
a computer program which, when running on your computer, allows a hacker to gain easy access to your computer system
a computer program whose purpose is to leave the infected computer
a control program installed on unsuspecting PCs that allow for the remote control of your computer
a delivery program for a virus
a destructive program that masquerades as a harmless application
a destructive program that poses as a harmless application
a file that is often hidden in, added to, or replaces a file that is obtained for another purpose
a form of virus (or more accurately it is related to them)
a full remote controll program
a hacker tool that is secretly installed on your Pc granting
a hole through which another computer may gain some control over your computer
a horse of a different color
a hostile disguised as a game, funny greeting card or useful utility, but really does something nasty like erase your hard drive
a hostile program that hides itself in your computer
a malicious file that disguises itself to infect your system
a malicious file , usually disguised as something useful, but when activated, can cause loss, damage or even theft of data
a malicious file which wraps itself up in an innocent looking file
a malicious piece of software which installs itself on a person's computer without their knowledge
a malicious program designed to hide itself on your hard drive to harm your data
a malicious program disguised as legitimate software
a malicious program disguised as something harmless, such as a game or a screen saver, but in fact contains hidden code that allows an intruder to access your computer without your knowledge
a malicious program that masquerades as a legitimate application
a malicious program that masquerades as a legitimate program
a malicious program that pretends to be a normal program
a malicious program which enters the system in a disguise
a malicious software program in which a worm or a virus is hidden within another, legitimate, program
a malware that performs a malicious action, but has no replication abilities
a malware that performs unexpected or unauthorized, often malicious, actions
a manmade computer program that can infect your computer but does not spread itself automatically
a master that first craftily infiltrates your PC, then unleashes its malware henchman
a mini program running on a workstation
an artificial construct designed to seduce and beguile itself into a fortress and then deliver a lethal payload
an e-mail designed to trick users into opening it and launching a virus
a network software application designed to remain hidden
an extremely destructive type of virus, which gives access to your password s, love letters and hard disc Anything
a phishing attack that attempts to steal online banking passwords
a piece of software that is used by hackers to gain access to your computer
a piece of software that usually hides within a legitimate-looking application or utility to gain entry into your computer system
a program installed on your computer that gives full access to hackers
a program in which malicious or harmful code is
a program (malicious code) that pretends to do something useful or 'fun', while in fact it is busy doing damage to your files
a programme similar to a virus which is disguised as something harmless like a game, but when launched sabotages the computer on which it is running
a program or file that appears to be desirable, useful or interesting, but harbors malicious code
a program placed on a system by a hacker or installed unknowingly by the user that conducts malicious actions while hiding or pretending to do something useful
a program pretending to do something, but is in fact doing something else, and you guess it, that 'something else' is a no-no
a program that allows a foreign system some level of control over the infected system
a program that appears to do one thing, but also has an unwanted activity hidden inside
a program that appears to perform a useful or entertaining function but contains a hidden program that installs itself onto your computer
a program that consists of two files, the actual program and a server
a program that deliberately does unpleasant things, as well as (or instead of) its declared function
a program that disguises itself as a useful program, and sometimes does do something useful, but when it is running it does something the user does not expect or know about
a program that does not normally replicate on a machine, but causes a major security concern
a program that does something more than the user was expecting, and that extra function is damaging
a program that does something undocumented that the programmer intended, but that some users would not approve of if they knew about it
a program that enables an attacker to get nearly complete control over an
a program that ente
a program that enters
a program that gets the user to voluntarily install it by masquerading as a legitimate application
a program that has gotten onto your machine without your knowledge and contains malicious code, that would for example allows persons using another computer to connect to yours over a network
a program which claims to do something or have
a program which gains entry to a computer by posing as something else, such as a game demo or a useful application
a program which installs itself surreptitiously onto your computer
a small program bugged in the target system and divert the system traffic towards the source
a small program you send to someone to infect their PC so you can control their PC, steal passwords, files or just have some fun
a software Computing
a specific type of computer virus
a tiny program which is running on a workstation (PC or Macintosh)
a type of malware that poses as legitimate software
a type of virus, that allows the creator and other hackers to access and potentially control your computer
a type of virus which normally requires a user to perform some action before the payload can be activated
a virus disguised as a real, proper program
a virus, spyware is considered adware or malware, software or
Backdoor program into your computer. Runs in the background so its harder to detect.
Unwanted software which runs in a user's machine, as an agent of the attacker, without user awareness. Unlike viruses and worms, trojans do not replicate (make copies of themselves.) We classify some pests simply as "Trojan". Others are more precisely classified as ANSI Bomb, AOL Pest, Annoyance, DDoS, Dialer, DoS, Dropper, Hostile ActiveX, Hostile Java, Hostile Script, Key Logger, Loader, Password Capture, RAT, Spyware, Trojan, War Dialer, and Worms. Examples • Most Common • Annual Growth
A program used to control a computer host with out the knowlege of the owner/operator.
Spyware or virus that masks itself as legitmate software and might install other spyware or viruses once installed on your computer.
A type of virus that appears to be a helpful and useful application but runs malicious processes in the background.
A virus that is concealed within an apparently innocuous package, which executes when the package, for example a .jpg file, is opened. The most commonly encountered Trojans contain payloads designed to seize control of aspects of device/network performance.
A form of virus. Once on a computer, Trojan programs run in the background deleting files or scrambling their contents. Alternatively, they can allow the computer to be controlled remotely, giving someone else access to files and applications.
A program which is usually given away for free which has a hidden purpose. It may be some type of file such as a video that user\'s may be interested in. The user would normally install and run this program although the installation would be so simple the user would be unaware of it. This program may or may not use a vulnerability to spread. It will usually lie dormant until the creator gives it instructions. It may be used to gain unauthorized access to a computer system.
A Trojan also known as Trojan horse is a program that looks legit, but actually is not. Trojans are usually attached to files popularly shared online, and when these files are run, the Trojan program can have many destructive effects. A Trojan programs does not replicate itself, it tries to modify setting on the computer its on to allow itself to exist for malicious purposes. Some of the effects of Trojans are opening backdoors on the system giving access to hackers as well as capture credit card information, passwords, email address, keystroke logging, using your computer to launch attacks.
(Trojan horse) A program that, when installed on a computer allows a remote person/computer to control the zombie computer to either directly attack the computer/data it stores or to atack other computers via the network (internet). One such way of attacking other computers is via a Denial of Service attack (DoS), sending spam email or directly breaking into another computer. In the last case, the zombie computer is used to "cover their tracks" and to attempt to hide where the attack truly came from.
This term refers to software which once installed and run on your computer performs malicious tasks or replicates. Usually this software is either hidden in legitamite software that you install or is installed by legitamite software on your computer without your permission. Either way this software is a virus hidden in legitamite software.
a program disguised as legitimate software which runs an undesirable program on a user's computer without their knowledge
See Trojan Horse.
An undesirable computer program that is either hidden inside another program or that pretends to be something it is not in order to trick potential users into running it. For example a program that looks by its name to perhaps be a picture file but when clicked on, does something entirely different. Often recieved as an attachment to an email.A Trojan program may spread itself by sending copies of itself to all the contacts in an address book.
Trojans, also called trojan horses, can be well comparend to the greek myth of troja. Analogous to the tale a trojan infects a system and makes use of this situation. It sends out passwords by email or lets the attacker remote control the system.
A program concealed within your computer that is malicious and hides its true intent. A type of virus.
Named for the Trojan Horse of the Aneid. A Trojan is "a program that claims to be one thing, but is, in fact, another." - from Ask Leon
A computer program that appears to perform a valid function but contains, hidden in its code, instructions that cause damage to computer systems. Strictly speaking, Trojan Horses are not viruses because they do not replicate.
is short for "Trojan Horse", which is malicious code disguised as a benign program to launch its devious payload when you run the program.
A Trojan (horse) is an "apparently useful program containing hidden functions that can exploit the privileges of the user [running the program], with a resulting security threat. A Trojan horse does things that the program user did not intend" Trojan horses rely on users to install them, or they can be installed by intruders who have gained unauthorised access by other means. Then, an intruder attempting to subvert a system using a Trojan horse relies on other users running the Trojan horse to be successful.
(Trojan horse) a program that appears to be doing something useful but is really malicious
A malicious program that usually installs itself onto a computer without the userâ€(tm)s knowledge and can cause a great deal of damage. Trojans are often attached to legitimate programs received on an e-mail and, once activated, can allow other people to gain access to the files on the infected computer.
"Trojan horse"; a reference to the story of the Trojan War, a piece of malware (such as a virus program) contained within a legitimate program. The purpose of the Trojan can be wide, but the distribution approach is to attempt to have the user willingly install the host program to gain access to the victim's computer.
A Trojan is a harmful program disguised as authentic software to deceive the user into opening it. It may appear to be an image or game. It spreads from the userâ€™s computer to other computers by sending copies of itself. It usually doesnâ€™t affect other programs like a virus.
Used by both Spyware and Viruses. A trojan is a small, invisible program that gets installed on your computer and then does something you won't like, such as sending out emails to everyone in your address book, or stealing your credit card number and secretly sending it to the thief who is using the trojan. The term refers to the "trojan horse" used by the citizens of Troy to invade and conquer a neighboring city by presenting an apparent "gift" (a large statue of a horse) which was hollow and full of soldiers who snuck out and conquered the city.
It "is a piece of unauthorized code hidden within a legitimate program (101)." Trojans can carry viruses and other programs that may damage your computer once you run the program that the trojan is hidden in. Trojan horses may be either simple batch files or code containing redirected escape sequences intercepted by the ANSI.SYS driver.
A Trojan horse is a program that allows a hacker to control your computer. Unlike a virus, a Trojan is not designed to replicate itself. It is generally disguised as a harmless software program and distributed as an e-mail attachment or free download. Once you open the file, the Trojan may install itself on your computer without your knowledge or consent. It has the ability to control files on your computer, including creating, deleting, renaming, viewing, or transferring them to or from your computer. It may allow the hacker to install, execute, open, or close software programs. They have the ability to run in the background, hiding their presence.
a piece of software that appears to perform some useful function but having its primary and more destructive purpose concealed.
A program which appears to be good, but is intended to cause harm.
A type of virus designed to give computer access to a hacker or transmit information to a third party.
Software which is seemingly harmless, but is actually malicious in nature. Trojans rely on the user of a computer to download and install them. They may monitor or alter the use of the computer, and may accidentally or deliberately damage or cause problems on the infected computer.
A secret undocumented routine embedded within a useful program. Execution of the program results in the execution of the secret routine, usually opening a backdoor into your computer's operating system for a hacker to misuse.
A Trojan is a computer program, or part of a programs code, that disguises itself as a useful software application that is used to gain access, or change settings on your computer. It takes its name after the Trojan horse used to infiltrate Troy.
A program that is disguised as a useful program or hidden inside another program to get you to install it. Many trojans are Remote Access Tools (RATs). A RAT trojan can give a remote user administrative privileges, and allow him or her full access to and control over your computer. Many Trojans have built-in tools, including tools to manage files (upload, download, and run executables on your computer), control your computer, and retrieve your passwords, log your keystrokes, capture your screens, etc..
A destructive program that masquerades as a benign application.
A seemingling harmless program that hides a malicious virus, such as a password program that secretly records the passwords entered and emails them to the author of the virus.
A piece of Malware which hides malicious or harmful code by disguising it as a useful or desirable utility, game or toy. Trojans are normally used to open a back door onto a computer so it can be controlled remotely.
Like the Trojan Horse in Greek mythology, Trojan programs are tiny little programs hidden inside larger regular programs. Like the Trojan warriors, these tiny programs are often hidden there to do nasty things to your computer, like erasing files.
A malicious program disguised as a different, harmless one.
A computer program, usually malicious, that disguises itself as something else.
A destructive computer virus that masquerades as a benign application. A trojan can be used to record keystrokes, view screen contents etc. It may also allow your PC to be remotely controlled by a computer hacker.
A program that has been designed to appear innocent but has been intentionally designed to cause some malicious activity or to provide a backdoor to your computer.
A program which masquerades as something it is not in order to gain unauthorised access to a PC. Usually a piece of malicious code contained in another seemingly harmless program. Derived from ancient Greek author Homer's renowned epic, the Iliad which relates the story of how the Greeks won the Trojan war by concealing their warriors in a huge, hollow wooden horse.
A Trojan is a piece of data which appears desirable on the outside but actually contains another, more harmful, piece of malware. See here if you believe you may have a trojan on your computer. See also Malware.
Named after the Trojan horse used by the rescuers of Helen of Troy. A Trojan is a computer program that disguises itself as a useful software application that is actually used to gain access to your computer. They fall into two categories 1. Time Bombs A Trojan will activate itself on a particular date. It finds the date when it is loaded into memory, as the computer has to keep a record of the date in memory to function. 2. Logic Bombs Logic bombs are triggered off by a particular sequence of events or conditions, for example; a key combination, number of files on a disk
This is a program or part of program code that performs destructive actions, i.e. depending on some conditions wipes out information on disks, hangs the system etc.
An apparently useful and innocent program containing additional hidden code, which allows the unauthorized collection, exploitation, falsification, or destruction of data. It is an executable program that is disguised as something innocuous such as a game, amusement, or common system command. Once executed it can install services or modify the system to allow an attacker access to the host. Examples of trojans are Back Orifice, NetBus, and SubSeven.
A program which appears to offer some benefit to the user, but which covertly does something else. The name originates from Greek mythology and the siege of Troy, but were unable to break through its defences until they hid some forces inside a gift, (Trojan Horse) that was taken into the city.
A Trojan is a program with hidden destructive functionality.
A Trojan is a computer virus. It can be attached to emails, downloaded from websites or hidden inside other downloadable files such as illegal movies or MP3 files. Typically, fraudsters will send out emails at random to try to get you to click on a link from the email and visit a fake website where the Trojan is installed. A fraudster can build a Trojan with a number of different purposes in mind, but the ones that affect Internet Banking are the ones that attempt to find out your security details. They can do this by capturing keystrokes or taking screen shots. If a Trojan is downloaded onto your computer, it could capture your password and other log in details and then 'send them home' to the fraudster - wherever they might live in the world. Anti-virus software can identify Trojans and remove them from your computer.
Much like the myth it was named after, a Trojan horse is a malicious piece of computer code disguised as something desirable. For example, a user may download a file from the Internet that appears to be a computer game or screen saver but which actually contains harmful computer code like a virus or worm. TechSupport's network monitoring and security defends computer networks against Trojans.
A harmful computer program disguised as a helpful application that can cause significant damage once it is run. Unlike viruses, Trojan horses do not replicate.
A virus that pretends to be something else so as to trick the user into running it (from Trojan Horse).
Trojans ( or Trojan Horses) are programs which perform a useful function which have malicious code hidden in them. See Also: Virus
A Program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
(2005-01-11) Chris Limb A piece of harmful code hidden in apparently legitimate data which often carries a virus
a program that neither replicates or copies itself, but does damage or compromises the security of the computer; typically spread via email, within a joke program or other malware
A program masquerading as a helpful application, but which contains a virus that can damage your computer. Trojans are often distributed as attachments through e-mail.
Trojans are programs (often malicious) that install themselves or run surreptitiously on a victims machine. They do not install or run automatically, but may entice users into installing or executing by masquerading as another program altogether (such as a game or a patch) or they may be packaged with hacked legitimate programs that install the trojan when the host program is executed. ...
A sort of virus although it does not replicate itself – it is something which is hidden in a file and, when activated, it does terrible damage … like a Friday 13th thingy – obviously named after the Trojan Horse.