Yahoo Web Search

Search results

  1. en.wikipedia.org › wiki › Trojan_HorseTrojan Horse - Wikipedia

    In Greek mythology, the Trojan Horse (Greek: δούρειος ίππος, romanized: doureios hippos, lit. 'wooden horse') was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war.

  2. A Trojan horse virus is a type of malware that disguises itself within legitimate applications and software. Discover how Trojans work and how to prevent Trojan attacks and protect users from the latest spyware, threats, and viruses.

  3. Trojan horse, huge hollow wooden horse constructed by the Greeks to gain entrance into Troy during the Trojan War. The horse was built by Epeius, a master carpenter and pugilist.

  4. A Trojan horse is a program that purports to perform some legitimate function, yet upon execution it compromises the user's security. A simple example is the following malicious version of the Linux sudo command.

  5. May 27, 2024 · Trojan War, legendary conflict between the early Greeks and the people of Troy in western Anatolia, dated by later Greek authors to the 12th or 13th century BCE. The war stirred the imagination of ancient Greeks more than any other event in their history and was celebrated in the Iliad and the Odyssey of Homer.

  6. May 8, 2024 · Trojan horse, or Trojan, is a type of malicious code or software that can take control of your computer. It is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. Once installed, a Trojan can perform the action it was designed for.

  7. There are many different types of harmful Trojan horses. Learn about best-known Trojan horse viruses, and how you can protect yourself.

  8. See Also: Trojan War, The Sack of Troy, The Returns of the Greek Heroes, Odysseus. The Trojan Horse tells the story of how Odyssues' stratagem helped the Greeks finally, after a decade-long siege, enter and destroy Troy.

  9. Dec 18, 2009 · When night fell, the horse opened up and a group of Greek warriors, led by Odysseus, climbed out and sacked the Troy from within. After the Trojan defeat, the Greeks heroes slowly made their...

  10. Like its namesake, Trojan horse attacks (or simply “Trojans”) in computing are defined as a type of malware that use deception and social engineering to trick unsuspecting users into running seemingly benign computer programs that hide malicious ulterior motives.

  1. People also search for