answersLogoWhite

0

it means to work like a clever trick

User Avatar

Wiki User

16y ago

What else can I help you with?

Related Questions

What does it mean to work like a Trojan?

== == meaning work hard


What does it mean To fight or work like a Trojan in Greek mythology?

i think it ment to work very hard, like a dog


Does not need a host program to work it substitutes itself for a legitimate program?

Trojan horse


How do you get rid of a Trojan Horse off of a Dell laptop?

try to call or contact your administrator that may work


To work like a Trojan origin?

you dude. these are my waffles.


How did the Trojan horse work?

Trojan horses are made as destructive software. they usually get download in some way or another then just sit and do nothing until a certain date. after that it run it's program(s) and messes-up your computer.The Trojan horse of Sparta was to secretly sneak soldiers into Troy Turkey in the Greek war against Troy.


When was the Trojan Horse computer Virus created and by who?

"Trojan Horse" does not refer to a specific computer virus, rather it refers to a particular characteristic of some computer malware. A Trojan Horse or Trojan is a bit of software that masquerades as legitimate software but contains hidden malware. It takes its name from the Greek tale from the Trojan War where the Greeks left a big wooden horse outside the gates of Troy with a bunch of Greek soldiers hidden inside. Just like the Greeks used their "Trojan Horse" to trick the Trojans into bringing them inside their defenses, Trojan malware tries to trick users into bringing the malware inside their computer defenses where it can then do its dirty work - such as (but not limited to) data theft, installing backdoors, turning the user's computer into a zombie in a botnet, trashing the computer. Since "Trojan Horse" only refers to a characteristic and not a specific virus, it is impossible to assign an actual date or perpetrator to it. It should also be understood that a Trojan is not really a virus. A virus replicates itself without user intervention, whereas a Trojan relies on tricking a user into downloading it. According to a survey conducted by BitDefender from January to June 2009, "Trojan-type malware is on the rise, accounting for 83-percent of the global malware detected in the world".


What is the best Trojan Horse remover for computers?

There are several ways to get rid of the Trojan Horse virus. You can manually find the infected program and delete it or you can download a anti virus program which will do it for you. There is not a "best" Trojan Horse remover as they all work the same in trying to get rid of the virus. Some brands include Nortan Antivirus, McAfee,etc.


What does a registered horse mean?

A purebred horse with the paper work that shows his ancestry.


To work like a horse means?

A horse is known to work in the fields and pull wagons and both activities are considered hard. When a person works like a horse, they are working very hard.


What does cowy mean in reference to horses?

cowwy means that a horse is a good cow horse, good for ranch work like working with cows like it can sense when they are going to move, and can track it, it's a western term when a horse has cow sense, popular in Quarter Horses hope that helps


What is 1stbar?

It's a Trojan horse Downloader. In the context of computer software, a Trojan horse is a malicious program that is disguised as legitimate software. The term is derived from the classical myth of the Trojan horse. They may look useful or interesting (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed. Often the term is shortened to simply trojan, even though this turns the adjective into a noun, reversing the myth (Greeks were gaining malicious access, not Trojans). There are two common types of Trojan horses. One, is otherwise useful software that has been corrupted by a cracker inserting malicious code that executes while the program is used. Examples include various implementations of weather alerting programs, computer clock setting software, and peer to peer file sharing utilities. The other type is a standalone program that masquerades as something else, like a game or image file, in order to trick the user into some misdirected complicity that is needed to carry out the program's objectives. Trojan horse programs cannot operate autonomously, in contrast to some other types of malware, like viruses or worms. Just as the Greeks needed the Trojans to bring the horse inside for their plan to work, Trojan horse programs depend on actions by the intended victims. As such, if trojans replicate and even distribute themselves, each new victim must run the program/trojan. Therefore their virulence is of a different nature, depending on successful implementation of social engineering concepts rather than flaws in a computer system's security design or configuration.