- Trojan means relating to the people, area or culture of ancient Troy.
An example of Trojan used as an adjective is in the phrase "Trojan War," which means the war fought in ancient Troy.
- The definition of a Trojan is a person from ancient Troy, a hardworking individual, or a malicious computer application.
- An example of a Trojan is a brave, determined warrior.
- An example of a Trojan is a network software application that hides on a computer while it performs attacks on the computer's system.
Origin of TrojanMiddle English Troyan ; from Classical Latin Trojanus ; from Troja, Troy
- a person born or living in ancient Troy
- a strong, hardworking, determined person
- Obsolete a merry, dissolute companion
- A native or inhabitant of ancient Troy.
- A person of courageous determination or energy.
Origin of TrojanMiddle English, from Latin Trōiānus, from Trōia, Troy, from Greek Troiā, Trōiā, from Trōs, the mythical founder of Troy.
Origin of TrojanFrom the official convention of naming such objects after the heroes of the Trojan War, a practice derived from the fact that the first such object to be observed was named after Achilles and the second after Patroclus.
- (computing) Malware that appears to perform or actually performs a desired task for a user while performing a harmful task without the user's knowledge or consent.
trojan - Computer Definition
Named after the Trojan Horse of ancient Greek history, it is a particular kind of network software application developed to stay hidden on the computer where it has been installed. As with worms, Trojans generally serve malicious purposes and are in the “malware” classification. Trojans sometimes access personal information stored on home or business computers and then send it to a remote party via the Internet. Alternatively, Trojans may serve merely as a back door application. Trojans can also launch DoS attacks.
A combination of firewalls and anti-virus software should be used to protect networks against Trojans.
New Trojans are released on a frequent basis. For example, on March 3, 2005, security experts at McAfee and SophosLabs issued alerts of a new Trojan virus called Troj/BagleD1-L. This Trojan tries to prevent various security applications (such as anti-virus and firewall software) from working by renaming files belonging to security applications so that they can no longer load. It then attempts to block access to a range of security-related Websites by altering the Windows HOSTS file. The virus is said to arrive on email messages having a ZIP attachment. After it is opened, the ZIP attachment includes a program file named “doc—01.exe” or “prs—03.exe” or some other name. If the program inside the ZIP attachment is opened, the Troj/BagleD1-L attempts to connect to one of many Websites to download more code.
About, Inc. Trojan. [Online, 2004.] About, Inc. Website. http://compnet working.about.com/cs/worldwideweb/g/bldef_trojan.htm; In Brief. Security Experts Fear New Trojan on the Loose. The Globe and Mail, March 3, 2005, p. B10.
A program that appears legitimate but performs some illicit activity when run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy the user's stored software and data. A Trojan is similar to a virus, except that it does not replicate itself. Often sneaking in attached to a free game or other supposedly worthwhile utility, the Trojan remains in the computer doing damage or allowing someone from a remote location to take control. See Trojan dropper, wiretap Trojan, rootkit, RAT, Back Orifice, NetBus, PrettyPark, Talking Trojan and virus. The Trojan Horse The term comes from Greek mythology, in which the Greeks battled the Trojans (people of Troy). After years of being unable to break into the fortified city, the Greeks built a wooden horse, filled it with soldiers and pretended to sail away. After the Trojans brought the horse into the city, the Greek soldiers crept out at night, opened the gates of Troy to the returning soldiers, and Troy was destroyed.