- Trojan means relating to the people, area or culture of ancient Troy.
An example of Trojan used as an adjective is in the phrase "Trojan War," which means the war fought in ancient Troy.
- The definition of a Trojan is a person from ancient Troy, a hardworking individual, or a malicious computer application.
- An example of a Trojan is a brave, determined warrior.
- An example of a Trojan is a network software application that hides on a computer while it performs attacks on the computer's system.
Trojan definition by Webster's New World
Origin: Middle English Troyan ; from Classical Latin Trojanus ; from Troja, Troy
- a person born or living in ancient Troy
- a strong, hardworking, determined person
- Obsolete a merry, dissolute companion
Trojan definition by American Heritage Dictionary
- A native or inhabitant of ancient Troy.
- A person of courageous determination or energy.
Origin: Middle English, from Latin Trōiānus, from Trōia, Troy, from Greek, from Trōs, the mythical founder of Troy.
- Troˈjan adjective
Origin: From the names of heroes of the Trojan War used for these asteroids.
trojan - Computer Definition
Named after the Trojan Horse of ancient Greek history, it is a particular kind of network software application developed to stay hidden on the computer where it has been installed. As with worms, Trojans generally serve malicious purposes and are in the “malware” classification. Trojans sometimes access personal information stored on home or business computers and then send it to a remote party via the Internet. Alternatively, Trojans may serve merely as a back door application. Trojans can also launch DoS attacks.
A combination of firewalls and anti-virus software should be used to protect networks against Trojans.
New Trojans are released on a frequent basis. For example, on March 3, 2005, security experts at McAfee and SophosLabs issued alerts of a new Trojan virus called Troj/BagleD1-L. This Trojan tries to prevent various security applications (such as anti-virus and firewall software) from working by renaming files belonging to security applications so that they can no longer load. It then attempts to block access to a range of security-related Websites by altering the Windows HOSTS file. The virus is said to arrive on email messages having a ZIP attachment. After it is opened, the ZIP attachment includes a program file named “doc—01.exe” or “prs—03.exe” or some other name. If the program inside the ZIP attachment is opened, the Troj/BagleD1-L attempts to connect to one of many Websites to download more code.
About, Inc. Trojan. [Online, 2004.] About, Inc. Website. http://compnet working.about.com/cs/worldwideweb/g/bldef_trojan.htm; In Brief. Security Experts Fear New Trojan on the Loose. The Globe and Mail, March 3, 2005, p. B10.
A program that appears legitimate, but performs some illicit activity when it is run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy programs or data on the hard disk. A Trojan is similar to a virus, except that it does not replicate itself. It stays in the computer doing its damage or allowing somebody from a remote site to take control of the computer. Trojans often sneak in attached to a free game or other utility. For information about various Trojans that are spread on the Internet, visit the Lockdown Corporation at www.lockdowncorp.com. See Trojan dropper, wiretap Trojan, rootkit, RAT, Back Orifice, NetBus, PrettyPark, Talking Trojan and virus. The Trojan Horse Trojan comes from Greek mythology, in which the Greeks battled the Trojans (people of Troy). After years of being unable to break into the fortified city, the Greeks built a wooden horse, filled it with soldiers and pretended to sail away. After the Trojans brought the horse into the city, the Greek soldiers crept out at night, opened the gates of Troy to the returning soldiers, and Troy was destroyed.