A Trojan Horse Virus is a common yet difficult to remove computer threat. This is a type of virus that attempts to make the user think that it is a beneficial application. A Trojan Horse virus works by hiding within a set of seemingly useful software programs. Once executed or installed in the system, this type of virus will start infecting other files in the computer.
A Trojan Horse Virus is also usually capable of stealing important information from the user's computer. It will then send this information to internet servers designated by the developer of the virus. The developer will then be able to gain a level of control over the computer through this Trojan virus. While these things take place, the user will notice that the infected computer has become very slow or unexpected windows pop up without any activity from the user. Later on, this will result to a computer crash.
It can spread in a number of ways. The most common means of infection is through email attachments. The developer of the virus usually uses various spamming techniques in order to distribute the virus to unsuspecting users. These emails contain attachments. Once the user opens the attachment, the Trojan Horse Virus immediately infects the system and performs the tasks mentioned above. Another method used by malware developers to spread their Trojan Horse viruses is via chat software such as Skype. Another method used by this virus in order to infect other machines is through sending copies of itself to the people in the address book of a user whose computer has already been infected by the virus.
A Trojan Horse virus The best way to prevent a Trojan Horse Virus from entering and infecting your computer is to never open email attachments or files that have been sent by unknown senders. However, not all files we can receive are guaranteed to be virus-free. With this, a good way of protecting your PC against malicious programs such as this harmful application is to install and update an anti-virus program.
The seven main types of Trojan horses are:
In modern useage, a Trojan horse is a false gift - something given to another person with the intent of hurting them.
In computer useage, a Trojan horse is a type of virus that gains access to your computer by appearing innocent then wrecking havoc once it's in.
answer 2A 'Trojan Horse' virus is a common and difficult to remove threat to a computer. It is a virus that attempts to make the user think that it is actually beneficial. It hides within a seemingly useful software program, but once executed or installed into your system it will start infecting other files in your computer. It is also usually capable of stealing important information from your computer and could even able to gain a level of control over your computer through this virus.
The Trojan horse was originally a gift, given to Troy by the Myceanean's.
The Trojan horse goes back to the time of Ancient Greece and Troy. There was a war between the Trojans and Mycenaeans. This war lasted ten years and is supposedly a legend. This war continued causing misery and death. Greeks thought and thought and thought how to end the war. They finally concluded that if perhaps they made a special offering to the gods, the gods might reward them with the city of Troy.
Trojan Horse refers to the Battle of Troy long ago. Basically one of the countries in the war gave a wooden horse to their opponent country Troy. The catch was the horse was filled with enemy soldiers, so when Troy brought the horse into their base, the soldiers came out and did much damage to Troy. I hope this helps, the way you heard it was probably metaphorically so try to relate. If this didnt help, Google it.
A Trojan horse program is a classification of malware that disguises itself in order to trick the user to downloading and installing it. Trojans make themselves look like legitimate programs, but when downloaded, they actually run malicious processes in the backround. A Trojan is not necessarily a type of malware, it is a technique in order to propagate other types of malware. A Trojan usually comes with the desired program that the user actually wants to download, but also installs other programs like viruses or worms onto the infected computer. Trojans also usually open up a backdoor or trapdoor to the Internet so that it can download more malware onto the infected computer or allow access from a hacker into the computer.
To put it on simpler terms. You can relate the virus to the actual Trojan horse in the Trojan war between Troy and the Greeks.
After the Greeks were unable to penetrate the Trojan walls. they decided to build a horse and offer it to the Trojans as a gift of peace. The Greeks left the wooden horse outside and the Trojans pulled it inside. However at night when everyone was done partying and drinking men came out of the wooden horse and started attacking the city from withing than allowing the other greek troops to get inside by opening the city gates.
The Trojan horse is a shell which can be filled with malicious virus. a trojan horse could appear as a music download or a video download from a website or anything.
When you download a file and it happens to be a trojan you just opened the gates to your computer.
it was a "gift" and inside it were many greek soldiers and was basically a ambushing weapon (although the horse didnt do real damage the horse only housed the mmen)
because poseidons sacred animal is a horse, and trojans were being protected by poseidon, and poseidon made horses with waves.
It means that it's a trap. The Trojan Horse that the Greeks built was a trick to sneak into Troy's camp.
A Trojan horse can loosely be described as a gift that backfires. It received its name from the "gift" that the Greeks left for the Trojans. It's also a computer virus.
Yes, see Related Link for more detail
A Trojan Horse virus spreads through anyway possible, but the main way to get a Trojan horse is by downloading un-legitimate programs from the internet. What does a Black Trojan horse do: enters and exit's your computer undetected bringing in viruses from a unknown source.
What is a hourse. What is spellcheck.
one
its not a virus its a trogan hourse i would recomend downloading spysweeper or spybot....and you get lots of bad things on your computer from looking at porn...... not that im saying you do
No.
u can tell if a hourse is mad if it trys to hit u or grinds his teeth so if a hourse dose that that mean give it space.if a hourse is scarded if will hide and stay away from u if a hourse is scard try to go pet it and let him no there nothin u should be scared of
Hourse and Carage
it depends
no
a filly
yes
Foal