Trojan Horse (computing)
A Trojan horse, or Trojan, is a type of malware that masquerades as a legitimate file or helpful program but whose real purpose is, for example, to grant a hacker unauthorized access to a computer. Trojans do not attempt to inject themselves into other files like a computer virus. Trojan horses may steal information, or harm their host computer systems. Trojans may use drive-by downloads or install via online games or internet-driven applications in order to reach target computers. The term is derived from the Trojan Horse story in Greek mythology because Trojan horses employ a form of “social engineering,” presenting themselves as harmless, useful gifts, in order to persuade victims to install them on their computers.
Read more about Trojan Horse (computing): Purpose and Uses, Current Use, Common Trojan Horses
Famous quotes containing the words trojan and/or horse:
“Every collectivist revolution rides in on a Trojan horse of Emergency. It was a tactic of Lenin, Hitler and Mussolini.... The invasion of New Deal Collectivism was introduced by this same Trojan horse.”
—Herbert Hoover (18741964)
“We read that the traveller asked the boy if the swamp before him had a hard bottom. The boy replied that it had. But presently the travellers horse sank in up to the girths, and he observed to the boy, I thought you said that this bog had a hard bottom. So it has, answered the latter, but you have not got half way to it yet. So it is with the bogs and quicksands of society; but he is an old boy that knows it.”
—Henry David Thoreau (18171862)