Trojan horse


Also found in: Dictionary, Thesaurus, Medical, Financial, Acronyms, Idioms, Wikipedia.
Related to Trojan horse: Trojan War

Trojan Horse

1. Greek myth the huge wooden hollow figure of a horse left outside Troy by the Greeks when they feigned retreat and dragged inside by the Trojans. The men concealed inside it opened the city to the final Greek assault
2. Computing a bug inserted into a program or system designed to be activated after a certain time or a certain number of operations
Collins Discovery Encyclopedia, 1st edition © HarperCollins Publishers 2005

Trojan horse

[‚trō·jən ′hȯrs]
(computer science)
A computer program that has an unannounced function in addition to a desirable apparent function.
McGraw-Hill Dictionary of Scientific & Technical Terms, 6E, Copyright © 2003 by The McGraw-Hill Companies, Inc.

Trojan Horse

hollow horse concealed soldiers, enabling them to enter and capture Troy. [Gk. Myth.: Iliad]
See: Deceit
Allusions—Cultural, Literary, Biblical, and Historical: A Thematic Dictionary. Copyright 2008 The Gale Group, Inc. All rights reserved.

Trojan horse

(application, security)
(Coined by MIT-hacker-turned-NSA-spook Dan Edwards) A malicious, security-breaking program that is disguised as something benign, such as a directory lister, archiver, game, or (in one notorious 1990 case on the Mac) a program to find and destroy viruses! A Trojan horse is similar to a back door.

See also RFC 1135, worm, phage, mockingbird.
This article is provided by FOLDOC - Free Online Dictionary of Computing (foldoc.org)

Trojan

A program that appears legitimate but performs some illicit activity when run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy the user's stored software and data. A Trojan is similar to a virus, except that it does not replicate itself. Often sneaking in attached to a free game or other supposedly worthwhile utility, the Trojan remains in the computer doing damage or allowing someone from a remote location to take control. See Trojan dropper, wiretap Trojan, rootkit, RAT, Back Orifice, NetBus, PrettyPark, Talking Trojan and virus.

The Trojan Horse
The term comes from Greek mythology, in which the Greeks battled the Trojans (people of Troy) in the 12th century BC. After years of being unable to break into the fortified city, the Greeks built a wooden horse, filled it with soldiers and pretended to sail away. After the Trojans brought the horse into the city, the Greek soldiers crept out at night, opened the gates of Troy to the returning soldiers, and Troy was destroyed.


The Trojan Horse
This is a scene from the 2004 movie "Troy," starring Brad Pitt, Eric Bana and Orlando Bloom. The movie was a huge success. (Image courtesy of Radiant Productions and Plan B Entertainment.)
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
This Note has argued that the determination of whether trojan horse organizers are employees under NLRA section 2(3) ultimately reduces to a single question -- whether trojan horse organizers are generally good employees.
| British Pakistani Boys, Education and the role of Religion: In the Land of the Trojan Horse is available to purchase from Amazon.co.uk
"What happened in the schools caught up in Trojan Horse in 2014 is clearly established and we must not shy away from challenging those who seek to deny there was a serious problem at that time.
Initially appearing in a compressed file called latestpics.tgz or latestpics.gz, this Trojan horse, after being decompressed, appears to be a graphic file.
The so-called Trojan Horse plot, which came to light in 2014, centred on an alleged move by a small group of hardline Muslims to seize control of a small number of Birmingham schools.
Upon activation the Trojan horse displays some pomographic images, as well as the following message:
Most interesting is the appearance of Trojan horse, Clagger-G, in the chart this month at number eight, which is a clear demonstration of mass spamming holding its own against self-spreading malware.
The spammed messages typically have no subject line and carry the message text "new price" and an attached file which can have one of several names and contains the BagleDl-U Trojan horse, said Sophos.
The cell then readily embraces the bacterium as something it thinks it wants, when in effect it's taking in a Trojan horse.' Falkow says a similar fakery is practiced by bacterial toxins that appear to cells as harmless hormones.
THE Department for Education is to reform disciplinary procedures for teachers to deal with any repeat of Birmingham's Trojan Horse scandal.
LONGER school days and small class sizes have been introduced by a failing Birmingham school at the heart of the Trojan Horse scandal in a bid to turn it around.
Sophos have warned users about a Trojan horse that poses as a wallchart for the World Cup tournament.