A CDE Definition
A Trojan that was unleashed in the summer of 1999. Spread as an email attachment, once executed, it causes users to log in to an Internet Relay Chat (IRC) channel when they surf the Web. The IRC channel is capable of downloading files and extracting personal data such as passwords and credit card numbers. See Trojan.
A program that appears legitimate but performs some illicit activity when run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy the user's stored software and data. A Trojan is similar to a virus, except that it does not replicate itself. Often sneaking in attached to a free game or other supposedly worthwhile utility, the Trojan remains in the computer doing damage or allowing someone from a remote location to take control. See Trojan dropper, wiretap Trojan, rootkit, RAT, Back Orifice, NetBus, PrettyPark, Talking Trojan and virus.
The Trojan Horse
The term comes from Greek mythology, in which the Greeks battled the Trojans (people of Troy). After years of being unable to break into the fortified city, the Greeks built a wooden horse, filled it with soldiers and pretended to sail away. After the Trojans brought the horse into the city, the Greek soldiers crept out at night, opened the gates of Troy to the returning soldiers, and Troy was destroyed.
Before/After Your Search Term
Terms By Topic
Click any of the following categories for a list of fundamental terms.