answersLogoWhite

0

What is a Trojan hourse?

Updated: 9/27/2023
User Avatar

Wiki User

11y ago

Best Answer
Two Types of Trojan HorseTrojan Horse in The IliadThe Trojan Horse is featured in Aeneid by the Latin writer Virgil. The Greek army, failing to take Troy, was almost at its breaking point. However, Odysseus devises a plan that includes this horse. The Greek army built a huge hollow wooden horse, filled it with a few dozen men, and left it at the Trojan gate. The Greeks then boarded their ships and traveled a short distance to hide their fleet. The horse was supposedly a gift to King Priam of troy from Agamemnon of Greece. The horse gets taken inside and during the night, the men jump out and open the Trojan gates for the whole of the Greek army to rush in and take the city. This is where the "Trojan" computer virus gets its name. Trojan Horse in ComputersA Trojan virus is a destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. Trojan horses are broken down in classification based on how they breach systems and the damage they cause.

A Trojan Horse Virus is a common yet difficult to remove computer threat. This is a type of virus that attempts to make the user think that it is a beneficial application. A Trojan Horse virus works by hiding within a set of seemingly useful software programs. Once executed or installed in the system, this type of virus will start infecting other files in the computer.

A Trojan Horse Virus is also usually capable of stealing important information from the user's computer. It will then send this information to internet servers designated by the developer of the virus. The developer will then be able to gain a level of control over the computer through this Trojan virus. While these things take place, the user will notice that the infected computer has become very slow or unexpected windows pop up without any activity from the user. Later on, this will result to a computer crash.

It can spread in a number of ways. The most common means of infection is through email attachments. The developer of the virus usually uses various spamming techniques in order to distribute the virus to unsuspecting users. These emails contain attachments. Once the user opens the attachment, the Trojan Horse Virus immediately infects the system and performs the tasks mentioned above. Another method used by malware developers to spread their Trojan Horse viruses is via chat software such as Skype. Another method used by this virus in order to infect other machines is through sending copies of itself to the people in the address book of a user whose computer has already been infected by the virus.

A Trojan Horse virus The best way to prevent a Trojan Horse Virus from entering and infecting your computer is to never open email attachments or files that have been sent by unknown senders. However, not all files we can receive are guaranteed to be virus-free. With this, a good way of protecting your PC against malicious programs such as this harmful application is to install and update an anti-virus program.

The seven main types of Trojan horses are:

  • Remote Access Trojans
  • Data Sending Trojans
  • Destructive Trojans
  • Proxy Trojans
  • FTP Trojans
  • Security Software Disabling Trojans
  • Denial-of-Service Attack (DoS) Trojans

A Trojan horse, or Trojan, is a type of malware that masquerades as a legitimate file or helpful program possibly with the purpose of granting a hacker unauthorized access to a computer. Trojans do not attempt to inject themselves into other files like a computer virus. Trojan horses may steal information, or harm their host computer systems. Trojans may use drive-by downloads or install via online games or internet-driven applications in order to reach target computers. The term is derived from the Trojan Horse story in Greek mythology because Trojan horses employ a form of "social engineering," presenting themselves as harmless, useful gifts, in order to persuade victims to install them on their computers.
A virus that disguises itself as a useful program to sneak into the victims computer.
In Greek mythology, the Trojan horse was a devious plot used by the Greeks to gain access to the city of Troy. A large wooden horse was built and several dozen Greek warriors hid inside the horse. The Trojans thought the Greeks were signalling peace and the horse was a gift, so they brought the wooden horse inside the city gates. Late at night the Greek warriors snuck out of the horse, opened the gates and laid waste to the city of Troy.

In modern useage, a Trojan horse is a false gift - something given to another person with the intent of hurting them.

In computer useage, a Trojan horse is a type of virus that gains access to your computer by appearing innocent then wrecking havoc once it's in.
answer 2A 'Trojan Horse' virus is a common and difficult to remove threat to a computer. It is a virus that attempts to make the user think that it is actually beneficial. It hides within a seemingly useful software program, but once executed or installed into your system it will start infecting other files in your computer. It is also usually capable of stealing important information from your computer and could even able to gain a level of control over your computer through this virus.

User Avatar

Wiki User

6y ago
This answer is:
User Avatar
User Avatar

momo

Lvl 1
3y ago
way to much info..i needed a 2 sentence explanation not a whole freakining book
User Avatar

Willow Caroline Mead...

Lvl 1
2y ago
Trojan horses enter a secure space, while an infected file proceeds to be downloaded and run. (APEX)
More answers
User Avatar

Wiki User

13y ago

The Trojan horse was originally a gift, given to Troy by the Myceanean's.

The Trojan horse goes back to the time of Ancient Greece and Troy. There was a war between the Trojans and Mycenaeans. This war lasted ten years and is supposedly a legend. This war continued causing misery and death. Greeks thought and thought and thought how to end the war. They finally concluded that if perhaps they made a special offering to the gods, the gods might reward them with the city of Troy.

This answer is:
User Avatar

User Avatar

Wiki User

11y ago

Trojan Horse refers to the Battle of Troy long ago. Basically one of the countries in the war gave a wooden horse to their opponent country Troy. The catch was the horse was filled with enemy soldiers, so when Troy brought the horse into their base, the soldiers came out and did much damage to Troy. I hope this helps, the way you heard it was probably metaphorically so try to relate. If this didnt help, Google it.

This answer is:
User Avatar

User Avatar

Wiki User

11y ago

A Trojan horse program is a classification of malware that disguises itself in order to trick the user to downloading and installing it. Trojans make themselves look like legitimate programs, but when downloaded, they actually run malicious processes in the backround. A Trojan is not necessarily a type of malware, it is a technique in order to propagate other types of malware. A Trojan usually comes with the desired program that the user actually wants to download, but also installs other programs like viruses or worms onto the infected computer. Trojans also usually open up a backdoor or trapdoor to the Internet so that it can download more malware onto the infected computer or allow access from a hacker into the computer.

To put it on simpler terms. You can relate the virus to the actual Trojan horse in the Trojan war between Troy and the Greeks.

After the Greeks were unable to penetrate the Trojan walls. they decided to build a horse and offer it to the Trojans as a gift of peace. The Greeks left the wooden horse outside and the Trojans pulled it inside. However at night when everyone was done partying and drinking men came out of the wooden horse and started attacking the city from withing than allowing the other greek troops to get inside by opening the city gates.

The Trojan horse is a shell which can be filled with malicious virus. a trojan horse could appear as a music download or a video download from a website or anything.

When you download a file and it happens to be a trojan you just opened the gates to your computer.

This answer is:
User Avatar

User Avatar

Wiki User

12y ago

it was a "gift" and inside it were many greek soldiers and was basically a ambushing weapon (although the horse didnt do real damage the horse only housed the mmen)

This answer is:
User Avatar

User Avatar

Wiki User

12y ago

because poseidons sacred animal is a horse, and trojans were being protected by poseidon, and poseidon made horses with waves.

This answer is:
User Avatar

User Avatar

Wiki User

12y ago

It means that it's a trap. The Trojan Horse that the Greeks built was a trick to sneak into Troy's camp.

This answer is:
User Avatar

User Avatar

Wiki User

13y ago

A Trojan horse can loosely be described as a gift that backfires. It received its name from the "gift" that the Greeks left for the Trojans. It's also a computer virus.

This answer is:
User Avatar

User Avatar

Wiki User

14y ago

Yes, see Related Link for more detail

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is a Trojan hourse?
Write your answer...
Submit
Still have questions?
magnify glass
imp