Ads
related to: trojan horse virus picturepandasecurity.com has been visited by 10K+ users in the past month
Search results
Results From The WOW.Com Content Network
In computing, a Trojan horse (or simply Trojan) is a malware that misleads users of its true intent by disguising itself as a normal program. The term is derived from the ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy. [1] Trojans are generally spread by some form of social engineering.
The Trojan Horse is not mentioned in Homer's Iliad, with the poem ending before the war is concluded, and it is only briefly mentioned in the Odyssey. But in the Aeneid by Virgil, after a fruitless 10-year siege, the Greeks constructed a huge wooden horse at the behest of Odysseus, and hid a select force of men inside, including Odysseus ...
Graybird is a Trojan horse that hides its presence on compromised computers and downloads files from remote Web sites. There are many variations of this virus. It was discovered on September 3, 2003 and affects Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP, and Windows Vista.
The worm attempts to download a trojan horse named WIN-BUGSFIX.exe. To achieve this, the victim's Internet Explorer homepage is set to a URL that downloads the trojan upon opening the browser. If the download is successful, the trojan is set to run upon reboot and the Internet Explorer homepage is set to a blank page. The trojan fulfils Guzman ...
February 16: Discovery of the first-ever malware for Mac OS X, a low-threat trojan-horse known as OSX/Leap-A or OSX/Oompa-A, is announced. Late March: Brontok variant N was found in late March. [45] Brontok was a mass-email worm and the origin for the worm was from Indonesia. June: Starbucks is a virus that infects StarOffice and OpenOffice.
This category is for Trojan horses, a form of computer malware. For the Greek legend about a hollow wooden horse that inspired the computing term, see Trojan horse.