Trojan horseTrojan horse
- Gr. Legend in the Trojan War, a huge, hollow wooden horse with Greek soldiers hidden inside that is left at the gates of Troy: the Trojans bring it into the city, thinking it a gift, and the soldiers creep out and open the gates to the rest of the Greek army, which destroys the city
- any person, group, or thing that seeks to subvert a nation, organization, etc. from within
- a computer program run or downloaded to perform a legitimate function, that also contains hidden instructions for an unauthorized, disruptive operation
- A subversive group or device placed within enemy ranks.
- The hollow wooden horse in which, according to legend, Greeks hid and gained entrance to Troy, later opening the gates to their army.
- Computers A program that appears to be legitimate but is designed to have destructive effects, as to data residing in the computer onto which the program was loaded.
(plural Trojan horses)
- (by extension) A subversive person or device placed within the ranks of the enemy.
- (computing) A malicious program that is disguised as legitimate software.
- (business) An offer made to lure customers, seeming like a good deal, that has the ultimate effect of extorting large amounts of money from the customer.
- (politics) A person, organization, social movement, legislation, or ideology with a negative agenda or evil intentions under the guise of positive values or good intentions.
(third-person singular simple present Trojan-horses, present participle Trojan-horsing, simple past and past participle Trojan-horsed)
- (idiomatic) To introduce slyly, to sneak in.
trojan horse - Computer Definition
A program that allows a remote user secretly to gain control of a computer. A Trojan horse masquerades as a legitimate computer game, utility, or application. Once activated, the program positions itself to load automatically, report its presence to a server, and listen for commands. A Trojan horse often contains hidden malicious code that does something to harm the victim's computer, perhaps severely. Trojan horses often are downloaded over the Internet by unsuspecting end users. Unlike a virus, a Trojan horse cannot replicate itself.The term comes from a Greek story of the Trojan War, in which the Greeks pretended to retreat from the battlefield and left a giant wooden horse at the gates of Troy, ostensibly as a peace offering. But after the Trojans dragged the horse inside the city walls, Greek soldiers sneaked out of the hollow belly of the horse and opened the city gates to the waiting Greek army, which captured Troy. Screensavers and emoticons are common Trojan horses. See also application, emoticon, Internet, malware, utility, virus, and worm.