A computer program that has an unannounced function in addition to a desirable apparent function.
2006-12-03 07:57:36
·
answer #1
·
answered by Neo 5
·
1⤊
0⤋
In the context of computer software, a Trojan horse is a malicious program that is disguised as or embedded within legitimate software. The term is derived from the classical myth of the Trojan Horse. They may look useful or interesting (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed.
There are two common types of Trojan horses. One, is otherwise useful software that has been corrupted by a cracker inserting malicious code that executes while the program is used. Examples include various implementations of weather alerting programs, computer clock setting software, and peer to peer file sharing utilities. The other type is a standalone program that masquerades as something else, like a game or image file, in order to trick the user into some misdirected complicity that is needed to carry out the program's objectives.
Trojan horse programs cannot operate autonomously, in contrast to some other types of malware, like viruses or worms. Just as the Greeks needed the Trojans to bring the horse inside for their plan to work, Trojan horse programs depend on actions by the intended victims. As such, if trojans replicate and even distribute themselves, each new victim must run the program/trojan. Therefore their virulence is of a different nature, depending on successful implementation of social engineering concepts rather than flaws in a computer system's security design or configuration.
2006-12-03 08:12:28
·
answer #2
·
answered by Ted B 6
·
0⤊
0⤋
A Trojan Horse is not a Virus or Spyware. It is a sperate type of malicious software that can be used to install a virus or spyware on your computer. Most adware (popups) are installed by Trojan Horses. Do not confuse this with popup ads at websites the Popup Blockers handle. Popup ads are installed on your computer and appear if you are online or not. They are usually trying to convince you to buy a program the will remove the Trojan used to install their adware. Never click on the links or pruchase their programs. The only thing they remove is money from your bank account.
AVG Antispyware (the old ewido program) is the best general Trojan remover available.
AdAware SE is also good but, not as good as AVGAS.
Using both the above gives you very good general Trojan removing ability.
Some Trojans are specialized and require specialized programs for removal. Smitfrauds and Vundo Trojans are typical of this. They both require specialized programs for each. SmitfraudFix and RogueFix for Smitfrauds and VundFix for Vundo's.
2006-12-03 11:24:10
·
answer #3
·
answered by Anonymous
·
0⤊
0⤋
A virus, which infects your PC, and then copies itself across other parts of your PC spreading itself, think the Trojan Horse from the Greek tale
2006-12-03 07:57:36
·
answer #4
·
answered by Anonymous
·
0⤊
0⤋
Adding to Ted B’s Wikipdia’s quotation, Trojan is malware which need to be manually started by you in order to do harm (having Trojan on PC shouldn’t cause any harm in itself as long as you don’t start it – start some disguised program for instance). If malware doesn’t require any action from you part to be installer and/or executed (beyond normal computer use as reading mails for instance) it is called “virus”. If it can infect you (install itself) merely by connecting to Internet – it is called “worm”. In new days above simplified definition starting to lose definite boundaries and even meaning of words themselves seems to be shifting. Many Trojans adds for instance hooks which allows their execution when you click on any Windows Explorer folder (“My computer”, “My document” or any other folder) as well number of other different ways. It’s hard to differentiate and decide anymore are they still Trojans or did they became viruses. Viruses are rather understood as sort of automated malwares, which when once get into the system have life of their own, doing number of things and propagating themselves without any interaction from user part. Trojans on other hand usually doesn’t propagate themselves at all, but rather allows remote manual control of system from remote location (backdoors). In that sense Trojans are rather just hacker tools installed on remote PC which allows remote control, while viruses and worms usually play role of transport and distribution means for other malwares (including Trojans).
PS.
LOL @ other gurls responses, Naughty, naughty...
2006-12-03 09:04:13
·
answer #5
·
answered by Lisa M 5
·
0⤊
0⤋
Anti-Virus application has a tendency to 'Quarantine' (or flow) trojans/worms/viruses in the event that they locate something they can't clean out of the gadget devoid of the shoppers intervention (often employing a device downloaded from the anti-virus seller, hence Mcafee). 'Quarantining' the trojan is only like locking somebody up in a room so as that they are in a position to't get to you, hence to offer up the trojan inflicting harm on your gadget. i desire I defined this nicely sufficient.
2016-10-13 22:34:55
·
answer #6
·
answered by ? 4
·
0⤊
0⤋
- a citizen of Troy, Greece
- a student or alumni of University of Southern California
- a malicious piece of software disguised as something else
- a brand of condom
2006-12-03 08:02:05
·
answer #7
·
answered by Elvis W 3
·
0⤊
0⤋
a trogan is a spy/virus and you don't want it in your PC. If you have one or think you have one, run this tool. http://www.microsoft.com/security/malwareremove/default.mspx. Also you should have a virus protection on your PC running at all times. If ya need one go to and download http://www.avast.com/i_kat_207.php. Good luck. Mikie.
2006-12-03 08:07:57
·
answer #8
·
answered by Mikie 3
·
0⤊
0⤋
It's a virus that pretends to be a harmless file right up until it attacks your computer.
2006-12-03 08:03:02
·
answer #9
·
answered by Anonymous
·
0⤊
0⤋
its a brand of condom
2006-12-03 07:57:11
·
answer #10
·
answered by Nat 1
·
1⤊
2⤋