Trojan Horse


A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The term comes from the a Greek story of the Trojan War, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse’s hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy.

Trojan horses are broken down in classification based on how they breach systems and the damage they cause. The seven main types of Trojan horses are:

Remote Access Trojans
Data Sending Trojans
Destructive Trojans
Proxy Trojans
FTP Trojans
security software disabler Trojans
denial-of-service attack (DoS) Trojans

Read Also:

  • Tru64

    A UNIX operating system from Compaq.

  • TruSurround XT

    TruSurround XT is the second generation of SRS TruSurround. Building upon its patented predecessor, TruSurround XT solves the problem of playing 5.1 or 6.1 multichannel content over two speakers (or headphones). TruSurround XT accepts input from up to a seven channel (6.1) audio source and processing a two-channel output. When receiving multichannel content, TruSurround XT […]

  • TrueFFS

    Short for True Flash File System TrueFFS is a technology patented by msystems (formerly M-Systems) for flash drive management. TrueFFS enables flash products to fully emulate hard disks when connected to the host processor.

  • TrueType

    An outline font technology developed jointly by Microsoft and Apple. Because TrueType support is built into all Windows and Macintosh operating systems, anyone using these operating systems can create documents using TrueType fonts. Since being introduced in 1991, TrueType has quickly become the dominant font technology for everyday use, and is even displacing PostScript in […]

  • Trusted Platform Module (TPM) Definition

    Trusted Platform Module (TPM) is a hardware device that is basically a secure micro-controller with added cryptographic functionality. It works with supporting software and firmware to prevent unauthorized access to a notebook computer. The TPM contains a hardware engine to perform up to 2048-bit RSA encryption/decryption. The TPM uses its built-in RSA engine during digital […]


Disclaimer: Trojan Horse definition / meaning should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. All content on this website is for informational purposes only.