Trojan Horse

(redirected from The trojan horse)
Also found in: Dictionary, Thesaurus, Encyclopedia, Wikipedia.
Related to The trojan horse: The trojan war

Trojan Horse

A computer virus that poses as an innocuous program. A Trojan horse appears to be harmless so that the user will install it, but then performs damaging activities like data theft or file deletion. The virus derives its name from the legendary wooden horse used by the Greeks to clandestinely gain access to Troy.
Mentioned in ?
References in periodicals archive ?
Five schools, three of them academies belonging to Park View Educational Trust, were put in special measures after five inquiries into the Trojan Horse scandal.
As a metaphor, however, the Trojan Horse imagery works effectively.
The public could not have confi-dence in Ofsted after it gave some of the affected schools glowing reports - only to decide they had serious problems after the Trojan Horse letter emerged, MPs said.
do you keep important company records or files on this computer you'd better hope not because there are files scattered all over it tucked away in invisible hidden folders undetectable by antivirus software the only way to remove them and this message is by a CIDN number 1 The Trojan horse continues to explain that a 'CIDN number' can be acquired by making a payment via Western Union to the hacker.
The Trojan horse copies itself to the /tmp folder (used to store temporary files) and installs a file called apphook.
Sources claim the ban is to be implemented following the recommendations made by the former counter-terrorism police chief Peter Clarke in his report into the Trojan Horse controversy.
If the user leaves the website open, the Trojan horse continues to display messages and the user's mouse becomes trapped, with further messages displayed that result in the computer being logged out.
If the program inside the ZIP file is opened, the Trojan horse tries to connect to one of a number of websites in order to download further malicious code.
By stealing the password and user identity, the trojan horse gives its author unlimited access to the user's network or ISP accounts, which can then be used illegally.
The Trojan horse application can then log the keystrokes of the unsuspecting user, collect system information and spread SPIM (spam over IM), according to security specialist F-Secure.
TEACHERS are to be offered "special packages" to lure them to Birmingham after the Trojan Horse scandal left city schools desperate for staff.
PLANS to plough almost PS12 million into boosting Birmingham's schools in the wake of the Trojan Horse plot will "restore confidence" in the council, union bosses have claimed.