Trojan horse attacks pose one of the most serious threats to computer security. If you were referred here, you may have not only been attacked but may also be attacking others unknowingly. This page will teach you how to avoid falling prey to them, and how to repair the damage if you already did. According to legend, the Greeks won the Trojan war by hiding in a huge, hollow wooden horse to sneak into the fortified city of Troy. In today's computer world, a Trojan horse is defined as a "malicious, security-breaking program that is disguised as something benign". For example, you download what appears to be a movie or music file, but when you click on it, you unleash a dangerous program that erases your disk, sends your credit card numbers and passwords to a stranger, or lets that stranger hijack your computer to commit illegal denial of service attacks like those that have virtually crippled the DALnet IRC network for months on end.
The following general information applies to all operating systems, but by far most of the damage is done to/with Windows users due to its vast popularity and many weaknesses.
Troy
The Trojan Horse
The Trojan Horse was a very successful distraction to allow the Greeks to infiltrate the town of Troy. The Trojan Horse was used during the Trojan war.
In greek mythology the Trojan horse was used in the time of the trojan war . It was used for the Greeks to hide in ,so that they can rule over troy.
It was used to gain access to the Trojan city.
The Greeks first used the Trojan horse to raze the city of Troy
the Trojan horse was a giant wooden hollow horse the Greeks used to hide soldiers in and to attack troy the Trojan symbol was a horse and they thought it was a gift
The Traditional Date that the Trojan horse was used is said to be 24th April 1184 BC
The Achaean soldiers.
yes there was a Trojan Horse.
A Trojan Horse.
The Trojan horse was pulled into Troy, hence 'Trojan'.
There aren't types of Trojan Horse virus. A Trojan Horse is a type of virus.