Meaning Trojan horse
What does Trojan horse mean? Here you find 66 meanings of the word Trojan horse. You can also add a definition of Trojan horse yourself

1

0 Thumbs up   0 Thumbs down

Trojan horse


Purposefully hidden malicious or damaging code within an authorized computer program. Scope Notes: Unlike viruses, they do not replicate themselves, but they can be just as destructive to a single com [..]
Source: isaca.org

2

0 Thumbs up   0 Thumbs down

Trojan horse


A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations o [..]
Source: sans.org

3

0 Thumbs up   0 Thumbs down

Trojan horse


An organisation with an innocuous or ‘motherhood statement’ type title used to gain public acceptance so as to introduce programs, funding or legislation of a more partisan nature than one is led to believe.
Source: democracy.org.au (offline)

4

0 Thumbs up   0 Thumbs down

Trojan horse


A type of malicious software (malware) named after the wooden horse the Greeks used to infiltrate Troy that masquerades as a legitimate computer program such as a game, image file, disk utilit [..]
Source: irmi.com

5

0 Thumbs up   0 Thumbs down

Trojan horse


See virus.
Source: tutorialspoint.com (offline)

6

0 Thumbs up   0 Thumbs down

Trojan horse


A harmless-looking program designed to trick you into thinking it is something you want, but which performs harmful acts when it runs. 
Source: dataprise.com

7

0 Thumbs up   0 Thumbs down

Trojan horse


A form of malware in which bad software masquerades as beneficial software. Reference(s) in IAPP Certification Textbooks: F99 Associated term(s): Malware
Source: iapp.org

8

0 Thumbs up   0 Thumbs down

Trojan horse


Copyright by Matisse "Trojan Horse" Enzer -->A computer program is either hidden inside another program or that masquerades as something it is not in order to trick potential users into r [..]
Source: matisse.net

9

0 Thumbs up   0 Thumbs down

Trojan horse


A maliciously-created computer program or virus that causes significant damage to a system. Trojan Horses are typically given attractive file names and placed on bulletin board systems. Damage usually occurs when the user launches the Trojan horse on his own system. Named after a successful offensive ploy made by the ancient Greek army at the siege [..]
Source: wildpackets.com (offline)

10

0 Thumbs up   0 Thumbs down

Trojan horse


A method of attacking a computer system, typically by providing a useful program which contains code intended to compromise a computer system by secretly providing for unauthorized access, the unautho [..]
Source: fda.gov

11

0 Thumbs up   0 Thumbs down

Trojan horse


Also known as Trojan Definition These are programs that appear harmless or even beneficial, but will contain other hidden programs that will install onto your computer without your knowledge. These hi [..]
Source: bleepingcomputer.com

12

0 Thumbs up   0 Thumbs down

Trojan horse


1. An apparently harmless program containing malicious logic that allows the unauthorized collection, falsification, or destruction of data. [2382-pt.8] 2.  [A] program containing hidden code allowing the unauthorized collection, falsification, or destruction of information. [INFOSEC-99]    3.  A computer program with an apparently or actually usef [..]
Source: atis.org (offline)

13

0 Thumbs up   0 Thumbs down

Trojan horse


[coined by MIT-hacker-turned-NSA-spook Dan Edwards] n. A program designed to break security or damage a system that is disguised as something else benign, such as a directory lister, archiver, a game, [..]
Source: hacker-dictionary.com

14

0 Thumbs up   0 Thumbs down

Trojan horse


Internet Glossary A Trojan horse is what seems to be legitimate software, but that does something destructive when run. SeeVirus 
Source: comptechdoc.org (offline)

15

0 Thumbs up   0 Thumbs down

Trojan horse


A type of virus (malicious code) that arrives posing as something harmless (or even desirable) and infects a computer by getting the user to activate it. It achieves this because it supposedly performs a function that the user wants – like install a piece of desirable software, open a presentation, show a picture, etc. while in fact it is activatin [..]
Source: thinkingit.com.au (offline)

16

0 Thumbs up   0 Thumbs down

Trojan horse


A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan [..]
Source: webopedia.com

17

0 Thumbs up   0 Thumbs down

Trojan horse


An insidious and usually illegal computer program that masquerades as a program that is useful, fun, or otherwise desirable for users to download to their system. Once the program is downloaded, it performs a destructive act. A virus.
Source: csgnetwork.com (offline)

18

0 Thumbs up   0 Thumbs down

Trojan horse


A computer program is either hidden inside another program or that masquerades as something it is not in order to trick potential users into running it. The term "Trojan Horse" comes from a [..]
Source: consp.com

19

0 Thumbs up   0 Thumbs down

Trojan horse


A Trojan Horse is a seemingly-innocent program that contains and conceals harmful code. When a Trojan Horse is opened, the malicious code performs its damage on the unsuspecting computer.
Source: dictionary.findlaw.com

20

0 Thumbs up   0 Thumbs down

Trojan horse


  a piece of software which appears to perform a certain action but in fact performs another such as transmitting a computer virus. Contrary to popular belief, this action, usually encoded in a hidden [..]
Source: pursuitmag.com

21

0 Thumbs up   0 Thumbs down

Trojan horse


A malicious computer program that appears legitimate but masks a destructive file or application. Unlike viruses, Trojan horses usually do not replicate themselves but can still cause a great deal of [..]
Source: td.org

22

0 Thumbs up   0 Thumbs down

Trojan horse


A program that appears as a legitimate and desirable program, but in actuality, performs undisclosed malicious functions on the machine. Most computer worms are trojan horses to hide the fact that access has been opened to intruders.
Source: oit.ncsu.edu (offline)

23

0 Thumbs up   0 Thumbs down

Trojan horse


A computer program that deceptively appears to be a useful computer application but is actually destructive. Trojans are known to create a backdoor on a computer that gives malicious users access to t [..]
Source: votingmachines.procon.org

24

0 Thumbs up   0 Thumbs down

Trojan horse


A Trojan Horse is human-made software programs created specifically to wreak mischief on personal computers and networks. The chance of contracting one of these malicious programs over the Internet ha [..]
Source: learnthenet.com

25

0 Thumbs up   0 Thumbs down

Trojan horse


A Trojan horse is a malicious software program that's disguised as being legitimate, so that users inadvertently open the program and run it. Trojans are used by hackers to gain unauthorized acce [..]
Source: mortgageloan.com

26

0 Thumbs up   0 Thumbs down

Trojan horse


A computer program is either hidden inside another program or that masquerades as something it is not in order to trick potential users into running it. For example a program that appears to be a game [..]
Source: massmailsoftware.com

27

0 Thumbs up   0 Thumbs down

Trojan horse


Malicious code that appears harmless but, when executed, can launch a virus or worm.
Source: isafe.org

28

0 Thumbs up   0 Thumbs down

Trojan horse


, or simply Trojan, is malware masquerading as legitimate software, named after the famous Trojan horse in which ancient Greek soldiers smuggled themselves into Troy. Trojans often act as a backdoor t [..]
Source: expressvpn.com

29

0 Thumbs up   0 Thumbs down

Trojan horse


A Trojan horse is a computer program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of dama [..]
Source: definitions.uslegal.com

30

0 Thumbs up   0 Thumbs down

Trojan horse


A program sent out on IRC that allows malicious users to gain access to your computer. Can be stopped by ignoring DCCs or only accepting files from people you trust.
Source: valinor.sorcery.net

31

0 Thumbs up   0 Thumbs down

Trojan horse


Malicious code that is hidden in a computer program or file that may appear to be useful, interesting, or at the very least harmless to you when using your computer. When this computer program or file [..]
Source: staysmartonline.gov.au

32

0 Thumbs up   0 Thumbs down

Trojan horse


A Trojan horse is a computer program that pretends to do one thing (like claim to be a picture) but actually does damage when one starts it (it can completely erase one's files). Trojan horses ca [..]
Source: seniorsguidetocomputers.com

33

0 Thumbs up   0 Thumbs down

Trojan horse


    Trojan horses are malicious programs disguised as something benign. They have been known to pose as games, utilities, and email attachments. Once opened, Trojan horses act much differently than ex [..]
Source: cgu.edu

34

0 Thumbs up   0 Thumbs down

Trojan horse


A computer program which carries within itself a means to allow the program's creator access to the system using it.
Source: portal.chicagonettech.com (offline)

35

0 Thumbs up   0 Thumbs down

Trojan horse


An insidious and usually illegal computer program that masquerades as a program that is useful, fun, or otherwise desirable for users to download to their system. Once the program is downloaded, it performs a destructive act.
Source: netdictionary.com (offline)

36

0 Thumbs up   0 Thumbs down

Trojan horse


a program that disguises its true purpose, usually for malicious intent. Most Trojans pretend to be normal programs but secretly attempt to damage the computer's data in some way. Unlike a virus, [..]
Source: halfhill.com

37

0 Thumbs up   0 Thumbs down

Trojan horse


A malicious program disguised as a useful or fun program. Trojan Horses are frequently transmitted as files attached to email message, can be downloaded from websites, or enter a computer via a USB or [..]
Source: rbc.com

38

0 Thumbs up   0 Thumbs down

Trojan horse


A malicious program that poses as a benign application. A Trojan horse program purposefully does something the user does not expect. Trojans are not viruses because they do not replicate, but Trojan h [..]
Source: kc.mcafee.com

39

0 Thumbs up   0 Thumbs down

Trojan horse


A malicious program that disguises itself as a beneficial or entertaining program but that actually damages a computer or installs code that can counteract security measures (perhaps by collecting passwords) or perform other tasks (such as launching a distributed denial of service attack). Unlike a computer virus, a Trojan horse does not replicate [..]
Source: cnc.ucr.edu (offline)

40

0 Thumbs up   0 Thumbs down

Trojan horse


A seemingly legitimate piece of software that carries an unwanted bit of programming code that can be used by hackers to gain unauthorized access to your computer.
Source: bankofamerica.com

41

0 Thumbs up   0 Thumbs down

Trojan horse


A malicious program that allows a hacker to make changes to your computer. Unlike a virus, a Trojan does not replicate itself. It is generally disguised as a harmless software program and distributed as an email attachment. Once you open the attachment, the Trojan may install itself on your computer without your knowledge or consent. It has the abi [..]
Source: webroot.com (offline)

42

0 Thumbs up   0 Thumbs down

Trojan horse


See also: Backdoor
Source: owasp.org

43

0 Thumbs up   0 Thumbs down

Trojan horse


google_ad_client="pub-8027288574377500";google_ad_slot="1043341745";google_ad_width=120;google_ad_height=600; Definition: A Trojan Horse is a variant of malicious software that can [..]
Source: computer-security-glossary.org

44

0 Thumbs up   0 Thumbs down

Trojan horse


An apparently legitimate software a user downloads that may contain hidden malicious code allowing a hacker access to that user’s computer. Trojans take many forms and can have many different intentio [..]
Source: enterprisebank.com

45

0 Thumbs up   0 Thumbs down

Trojan horse


This is also known as Trojan. A Trojan is a worm or virus, which is programmed by a third party to carry out a specific task without the user's knowledge or consent.
Source: k7computing.com

46

0 Thumbs up   0 Thumbs down

Trojan horse


Named after the gift horse in the Greek legend, it is malicious hardware or a software program disguised as a useful device or program. By operating it, the unsuspecting user may cause damage to their [..]
Source: microsemi.com

47

0 Thumbs up   0 Thumbs down

Trojan horse


Malicious code that is hidden in software that has an apparently beneficial or harmless use.
Source: ithandbook.ffiec.gov

48

0 Thumbs up   0 Thumbs down

Trojan horse


If you read "The Iliad" in high school, you will remember that the Trojan horse concealed an army and fooled the citizens of Troy into taking it inside its city walls. Once inside the city g [..]
Source: security.illinois.edu

49

0 Thumbs up   0 Thumbs down

Trojan horse


A malicious program that is disguised or embedded within a legitimate software program that, when activated, unwittingly allows hackers to gain unauthorized access to the computer.
Source: safecu.org

50

0 Thumbs up   0 Thumbs down

Trojan horse


Software that claims to perform one function but actually performs malicious functions secretly.
Source: documentation.cpanel.net (offline)

51

0 Thumbs up   0 Thumbs down

Trojan horse


A Trojan horse is a seemingly benign program that when activated, causes harm to a computer system. A Trojan horse is also known as a Trojan virus or Trojan.
Source: techopedia.com

52

0 Thumbs up   0 Thumbs down

Trojan horse


an apparently innocuous program that contains code designed to surreptitiously access information or computer systems without the user's knowledge virus
Source: dealers-insurance.com

53

0 Thumbs up   0 Thumbs down

Trojan horse


A seemingly innocent computer programme (or malware
Source: sturgeonventures.com (offline)

54

0 Thumbs up   0 Thumbs down

Trojan horse


A program that appears harmless, but its true purpose is malicious. Trojan horses are used for various purposes including allowing someone remote access to a victim's computer (remote access troj [..]
Source: landofcode.com

55

0 Thumbs up   0 Thumbs down

Trojan horse


A computer threat that can be easily (and unwillingly) downloaded and performs malicious functions that expose the machine to unauthorized access.
Source: mica.edu (offline)

56

0 Thumbs up   0 Thumbs down

Trojan horse


A programme that appears to be useful or harmless but actually hides malicious or harmful code designed to exploit or damage the system on which it is run.
Source: bankinginfo.com.my (offline)

57

0 Thumbs up   0 Thumbs down

Trojan horse


A computer program that masquerades as something it isn't, such as a game, but performs a destructive activity once it is run, such as stealing a password or destroying data on your hard drive. A [..]
Source: ml.com

58

0 Thumbs up   0 Thumbs down

Trojan horse


A malicious program that is disguised or embedded within legitimate software program that, when activated, unwittingly allows hackers to gain unauthorized access to the computer.
Source: uhcu.org (offline)

59

0 Thumbs up   0 Thumbs down

Trojan horse


When a man covertly slips off his condom during intercourse in order to secretly unleash his soldiers inside his partner.
Source: cltampa.com

60

0 Thumbs up   0 Thumbs down

Trojan horse


In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive wooden horse that [..]
Source: en.wikipedia.org

61

0 Thumbs up   0 Thumbs down

Trojan horse


The Trojan Horse is a tale from the Trojan War about the subterfuge that the Greeks used to enter the independent city of Troy and win the war. In the canonical version, after a fruitless 10-year sieg [..]
Source: en.wikipedia.org

62

0 Thumbs up   0 Thumbs down

Trojan horse


The Trojan Horse, according to legend, was a giant hollow horse in which Greeks hid to gain entrance to Troy. Trojan Horse may also refer to: Trojan horse (business), a business offer that appears to [..]
Source: en.wikipedia.org

63

0 Thumbs up   0 Thumbs down

Trojan horse


"Trojan Horse" is the fifth single by the Dutch girl group Luv', released in autumn 1978 by Philips/Phonogram Records. This million seller appears on the German version of the group's first [..]
Source: en.wikipedia.org

64

0 Thumbs up   0 Thumbs down

Trojan horse


In business, a trojan horse is an advertising offer made by a company that is designed to draw potential customers by offering them cash or something of value for acceptance, but following acceptance, [..]
Source: en.wikipedia.org

65

0 Thumbs up   0 Thumbs down

Trojan horse


Trojan Horse is the twentieth episode of the third series of the 1960s cult British spy-fi television series The Avengers, starring Patrick Macnee and Honor Blackman. It originally aired on ABC on 8 F [..]
Source: en.wikipedia.org

66

0 Thumbs up   0 Thumbs down

Trojan horse


Trojan Horse is the twentieth episode of the third series of the 1960s cult British spy-fi television series The Avengers, starring Patrick Macnee and Honor Blackman. It originally aired on ABC on 8 F [..]
Source: en.wikipedia.org





<< Triple DES Trusted process >>

Dictionary.university is a dictionary written by people like you and me.
Please help and add a word. All sort of words are welcome!

Add meaning