Trojan


Also found in: Dictionary, Thesaurus, Medical, Financial, Idioms, Wikipedia.
Related to Trojan: Trojan War, Durex

Trojan

1. a native or inhabitant of ancient Troy
2. of or relating to ancient Troy or its inhabitants
Collins Discovery Encyclopedia, 1st edition © HarperCollins Publishers 2005

Trojan

A program that appears legitimate but performs some illicit activity when run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy the user's stored software and data. A Trojan is similar to a virus, except that it does not replicate itself. Often sneaking in attached to a free game or other supposedly worthwhile utility, the Trojan remains in the computer doing damage or allowing someone from a remote location to take control. See Trojan dropper, wiretap Trojan, rootkit, RAT, Back Orifice, NetBus, PrettyPark, Talking Trojan and virus.

The Trojan Horse
The term comes from Greek mythology, in which the Greeks battled the Trojans (people of Troy) in the 12th century BC. After years of being unable to break into the fortified city, the Greeks built a wooden horse, filled it with soldiers and pretended to sail away. After the Trojans brought the horse into the city, the Greek soldiers crept out at night, opened the gates of Troy to the returning soldiers, and Troy was destroyed.


The Trojan Horse
This is a scene from the 2004 movie "Troy," starring Brad Pitt, Eric Bana and Orlando Bloom. The movie was a huge success. (Image courtesy of Radiant Productions and Plan B Entertainment.)
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
The Trojan can create an SSH server for camouflaging its communication channels.
Axis Tower, Gate Tower, and Vida Residence are some of Trojan's completed projects in Abu Dhabi, and the firm is currently developing 17 Icon Bay, Harbour Gate Tower, and the Address Residences in Dubai.
Mobile banking Trojans top the list of cyber threats.
Now 97 and living with his daughter in a Bloomingdale town house, Trojan will quietly mark the invasion's 75th anniversary today as the diminishing ranks of survivors reunite at Normandy for what will likely be their last major observance.
Kaspersky Lab detected several popular Trojan families among the "TOP 20 mobile malware programs" using the WAP-billing service.
Based on Kaspersky Lab research it was the third most common Trojan in June 2017, among those exploiting WAP-billings, and is still active mainly in Russia.
If the trojan does not receive the necessary permission, it will completely block the infected device.
Beating fierce competition Trojan impressed the judging panel with their bespoke approach to service delivery.
Trojan designed this new AGM line from the "ground up" with features that maximise sustained performance and increase total energy output to meet the requirements of deep-cycling applications.
19 -- ESET, a global pioneer in proactive protection for more than 25 years, traces the evolution of Webinject Banking Trojans. ESET's Jean-Ian Boutin has been analyzing these forms of threats for several years and his paper titled "The Evolution of Webinject" uncovers many interesting facts about these banking trojans.