answersLogoWhite

0


Best Answer

The term, Trojan horse, comes from Homer's Iliad, which tells of the Trojan War. To defeat the enemy, Odysseus and his men build a giant wooden horse, place it in front of Troy's gates and hide inside. The Trojans accept the gift as a sign of surrender bring it inside their walls. They celebrate and get drunk. At night, when the town was asleep, Odysseus and his men come out from inside the horse. They open the city gates to let in more Greek troops and then destroy the city of Troy, winning the war.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Where did the term Trojan horse virus come from?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is a virus that hides within or looks like legitimate program until triggered?

Trojan Horse some programs that hide or programs that so you want uninstall them, like a parental control program ,put on there so their kids don't go to web sites that have nudity, & sex stuff, so it hide in the root directory..


What is the legend of Trojan Horse?

It was a large horse made by the Trojan's of wood with a door concealed under the belly, it was offered as a gift to gain entrance into a fortrace, once the fortrace doors were opened and the large horse was brought inside, the soldier's inside waited til all was quit and gained access to fight inside the fortress. So a Trojan Horse is a term used for a hidden virus, It is concealed in a program and then gains access through disguise into your computer....


Why in computing a Trojan is called a Trojan when in reality it should be called a greek. as it was the greeks that hid inside the Trojan horse?

When the Greeks left the wooden horse outside Troy they also left the spy Sinon to be captured by the Trojan forces. Sinon explained to the Trojans that the horse was a charm to get the Greek ships home safely, and that if the Trojans could take the horse inside their city it would protect Troy from future Greek attack. The idea was that the Trojan's claimed the horse as a gift, hoping to benefit from it; but this was what led to the fall of their city. A virus which describes itself as an app plays the same trick: it looks like a gift, but in fact is a poison. So Trojan is the correct term.


What does tor-son horse mean in term of viruses?

its called a Trojan horse, it a type of virus, tht gets into ur computer and downloads a virus through some trigger. for instance there was one previously on facebook. it was sent to lots of people, by someone you knew (but that person didnt really send it; part of the virus) & it said that you are on some video. when you clicked the link, unless you had good firewall protection, you received a virus.


What is a torjan horse virus?

A Trojan Horse virus is a piece of software that infects a users system and either broadcasts private information out onto the internet or lets hackers enter the system. miranda802001 Trojan horse virus, or simply trojan, is a piece of software which appears to perform a certain action but in fact performs another such as a computer virus. Contrary to popular belief, this action, usually encoded in a hidden payload, may or may not be actually malicious, but Trojan horses are notorious today for their use in the installation of backdoor programs. Simply put, a Trojan horse is not a computer virus. Unlike such malware, it does not propagate by self-replication but relies heavily on the exploitation of an end-user. It is instead a categorical attribute which can encompass many different forms of codes. Therefore, a computer worm or virus may be a Trojan horse. The term is derived from the classical story of the Trojan Horse. In the field of computer architecture, 'Trojan Horse' can also refer to security loopholes that allow kernel code to access anything for which it is not authorized. ernesto diplo vision


Name the computer virus and their effect?

A backdoor is a kind of a Trojan horse virus. A Trojan horse virus is a file that appears to be one thing but is really a virus, for instance if you downloaded a certain screensaver, it would actually be a virus. On the other hand, a backdoor is a term that means unauthorized access to a computer. It attacks either by spam e-mail, downloading files, or visiting certain websites. The way a hacker writes a backdoor is by using a program that builds an internet server, the hacker puts in a random IP address, and a TCP port number to communicate with it. They can then see everything you do, they can log keystrokes, look at files, and even launch webcams.


What is a Trojan hourse?

Two Types of Trojan HorseTrojan Horse in The IliadThe Trojan Horse is featured in Aeneid by the Latin writer Virgil. The Greek army, failing to take Troy, was almost at its breaking point. However, Odysseus devises a plan that includes this horse. The Greek army built a huge hollow wooden horse, filled it with a few dozen men, and left it at the Trojan gate. The Greeks then boarded their ships and traveled a short distance to hide their fleet. The horse was supposedly a gift to King Priam of troy from Agamemnon of Greece. The horse gets taken inside and during the night, the men jump out and open the Trojan gates for the whole of the Greek army to rush in and take the city. This is where the "Trojan" computer virus gets its name. Trojan Horse in ComputersA Trojan virus is a destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. Trojan horses are broken down in classification based on how they breach systems and the damage they cause. A Trojan Horse Virus is a common yet difficult to remove computer threat. This is a type of virus that attempts to make the user think that it is a beneficial application. A Trojan Horse virus works by hiding within a set of seemingly useful software programs. Once executed or installed in the system, this type of virus will start infecting other files in the computer.A Trojan Horse Virus is also usually capable of stealing important information from the user's computer. It will then send this information to Internet servers designated by the developer of the virus. The developer will then be able to gain a level of control over the computer through this Trojan virus. While these things take place, the user will notice that the infected computer has become very slow or unexpected windows pop up without any activity from the user. Later on, this will result to a computer crash.It can spread in a number of ways. The most common means of infection is through email attachments. The developer of the virus usually uses various spamming techniques in order to distribute the virus to unsuspecting users. These emails contain attachments. Once the user opens the attachment, the Trojan Horse Virus immediately infects the system and performs the tasks mentioned above. Another method used by malware developers to spread their Trojan Horse viruses is via chat software such as Skype. Another method used by this virus in order to infect other machines is through sending copies of itself to the people in the address book of a user whose computer has already been infected by the virus.A Trojan Horse virus The best way to prevent a Trojan Horse Virus from entering and infecting your computer is to never open email attachments or files that have been sent by unknown senders. However, not all files we can receive are guaranteed to be virus-free. With this, a good way of protecting your PC against malicious programs such as this harmful application is to install and update an anti-virus program.The seven main types of Trojan horses are:Remote Access TrojansData Sending TrojansDestructive TrojansProxy TrojansFTP TrojansSecurity Software Disabling TrojansDenial-of-Service Attack (DoS) TrojansA Trojan horse, or Trojan, is a type of malware that masquerades as a legitimate file or helpful program possibly with the purpose of granting a hacker unauthorized access to a computer. Trojans do not attempt to inject themselves into other files like a computer virus. Trojan horses may steal information, or harm their host computer systems. Trojans may use drive-by downloads or install via online games or internet-driven applications in order to reach target computers. The term is derived from the Trojan Horse story in Greek mythology because Trojan horses employ a form of "social engineering," presenting themselves as harmless, useful gifts, in order to persuade victims to install them on their computers.A virus that disguises itself as a useful program to sneak into the victims computer.In Greek mythology, the Trojan horse was a devious plot used by the Greeks to gain access to the city of Troy. A large wooden horse was built and several dozen Greek warriors hid inside the horse. The Trojans thought the Greeks were signalling peace and the horse was a gift, so they brought the wooden horse inside the city gates. Late at night the Greek warriors snuck out of the horse, opened the gates and laid waste to the city of Troy. In modern useage, a Trojan horse is a false gift - something given to another person with the intent of hurting them.In computer useage, a Trojan horse is a type of virus that gains access to your computer by appearing innocent then wrecking havoc once it's in.answer 2A 'Trojan Horse' virus is a common and difficult to remove threat to a computer. It is a virus that attempts to make the user think that it is actually beneficial. It hides within a seemingly useful software program, but once executed or installed into your system it will start infecting other files in your computer. It is also usually capable of stealing important information from your computer and could even able to gain a level of control over your computer through this virus.


What is meanby Trojan horse virus?

A Trojan horse, or Trojan, is malware that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access of the user's computer system. "It is a harmful piece of software that looks legitimate. Users are typically tricked into loading and executing it on their systems", as Cisco describes.[1] The term is derived from the Trojan Horse story in Greek mythology.Trojan horses are created for the purpose of running code on the user's computer that he otherwise would not have consented to, allowing the author of the Trojan access to a number of personally-desired purposes.AdwareA Trojan horse may modify the user's computer to display advertisements in undesirable places, such as the desktop or in uncontrollable pop-ups, or it may be less notorious, such as installing a toolbar on to the user's Web browser without prior mentioning. This can create the author of the Trojan revenue, despite it being against the Terms of Service of most major Internet advertising networks, such as Google AdSense


If you have a Trojan horse and AVG reports that it deletes it but the virus either isn't removed or it comes back can you describe how to remove it in simple language?

To be able to tell you how to remove it, I'd really need to know its name. The term "Trojan Horse" is just a general label that covers many different types of parasites, malware, spyware, worms, adware and so on. I've posted a few links to check out that I've found to be very helpful in the past when I've had virus difficulties. Check AVG's log file and see what the Trojan's name is or which files are infected then fo to one of the links I posted for you and search for the Trojan by name or an infected filename. If this turns up no results, go to the Forum and ask for help. Sorry I couldn't be more help.


Where does the term threw a shoe come from?

I believe it originated in horse racing.


Where does the term pure breeding come from?

when the horses are bred with the same breed of horse


Where does polio virus come from?

Polio is a Greek term meaning pain and suffering to man kind.