answersLogoWhite

0

Trojan War

The Trojan War was a major event in Greek mythology. According to the stories, it was triggered when Paris, the prince of Troy, either seduced or kidnapped the beautiful Helen away from her husband, the king of Sparta. The war lasted twenty years.

1,190 Questions

How did Helen start the Trojan war?

Paris who is Priam's son, steals Helen from the Achaian side and that starts the war. Though it is debatable whether Helen leaves with free will or not, the action of taking her is a significant breach in the Greek Value of hospitality which gives the Achaians ample reason to attack.

How the trojan war begin?

Helen of Sparta, wife to Menelaus was kidnapped by Paris of Troy because Paris was promised the most beautiful woman in Greece by Aphrodite after he judged Athena, Aphrodite and Hera in a contest of who was the fairest.

When did the Trojan War begin?

Tradition places it in the early 12th Century BCE

Who was the priest that warned the Trojan's?

The priest who warned the Trojans about the Wooden Horse was Laocoön. He cautioned the Trojans not to trust the Greeks and the gift they had left behind. However, his warnings were ignored, and the Trojans brought the Wooden Horse into their city, leading to their downfall.

Who was Hector in the Trojan War?

Hector was a prominent hero and warrior on the Trojan side during the Trojan War. He was the eldest son of King Priam and Queen Hecuba, and he was considered the greatest Trojan warrior. Hector's valor and leadership were admired by both sides, but he was ultimately killed by Achilles in the final year of the war.

What was so amazing about the outcome of the Trojan war?

One of the most amazing aspects of the outcome of the Trojan War is the use of the Trojan Horse. This deceptive tactic allowed the Greek army to enter the seemingly impenetrable city of Troy, leading to its ultimate downfall. The story of the Trojan Horse has since become a symbol of cunning and deceit.

What did people eat duing the Trojan war?

Considering the siege of Troy lasted over ten years, and it is probable that they ate a wide variety of food.

As they were islanders besieging a coastal city, it is also likely they consumed lots of sea food.

Does the Trojan horse exist?

The story of the Trojan horse is meant as an allegory to the tricks people can use to gain the upper hand. It may or may not be a true story but similar ruses have certainly been carried out. It this sense the Trojan horse does exist.

What was the height of the Trojan horse?

The Trojan horse was 30 meters high. (60 feet high)

What material was used to make the Trojan horse?

Pine, if you believe Virgil's Aenead.

By destiny compelled, and in despair,The Greeks grew weary of the tedious war,And by Minerva's aid a fabric reared,Which like a steed of monstrous height appeared:The sides were planked with pine; they feigned it madeFor their return, and this the vow they paid.Thus they pretend, but in the hollow sideSelected numbers of their soldiers hide:With inward arms the dire machine they load,And iron bowels stuff the dark abode.

Where was the Trojan horse used?

Trojan horse attacks pose one of the most serious threats to computer security. If you were referred here, you may have not only been attacked but may also be attacking others unknowingly. This page will teach you how to avoid falling prey to them, and how to repair the damage if you already did. According to legend, the Greeks won the Trojan war by hiding in a huge, hollow wooden horse to sneak into the fortified city of Troy. In today's computer world, a Trojan horse is defined as a "malicious, security-breaking program that is disguised as something benign". For example, you download what appears to be a movie or music file, but when you click on it, you unleash a dangerous program that erases your disk, sends your credit card numbers and passwords to a stranger, or lets that stranger hijack your computer to commit illegal denial of service attacks like those that have virtually crippled the DALnet IRC network for months on end.

The following general information applies to all operating systems, but by far most of the damage is done to/with Windows users due to its vast popularity and many weaknesses.

What are the advantages of Trojan horse?

It's an important metaphor for something that is not what it appears to be.

Which female was the prize of the Trojan war?

I think you are referring to Helen of Sparta/Troy. However, she wasn't the prize of the war, she is what started it.

What is a Trojan hourse?

Two Types of Trojan HorseTrojan Horse in The IliadThe Trojan Horse is featured in Aeneid by the Latin writer Virgil. The Greek army, failing to take Troy, was almost at its breaking point. However, Odysseus devises a plan that includes this horse. The Greek army built a huge hollow wooden horse, filled it with a few dozen men, and left it at the Trojan gate. The Greeks then boarded their ships and traveled a short distance to hide their fleet. The horse was supposedly a gift to King Priam of troy from Agamemnon of Greece. The horse gets taken inside and during the night, the men jump out and open the Trojan gates for the whole of the Greek army to rush in and take the city. This is where the "Trojan" computer virus gets its name. Trojan Horse in ComputersA Trojan virus is a destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. Trojan horses are broken down in classification based on how they breach systems and the damage they cause.

A Trojan Horse Virus is a common yet difficult to remove computer threat. This is a type of virus that attempts to make the user think that it is a beneficial application. A Trojan Horse virus works by hiding within a set of seemingly useful software programs. Once executed or installed in the system, this type of virus will start infecting other files in the computer.

A Trojan Horse Virus is also usually capable of stealing important information from the user's computer. It will then send this information to Internet servers designated by the developer of the virus. The developer will then be able to gain a level of control over the computer through this Trojan virus. While these things take place, the user will notice that the infected computer has become very slow or unexpected windows pop up without any activity from the user. Later on, this will result to a computer crash.

It can spread in a number of ways. The most common means of infection is through email attachments. The developer of the virus usually uses various spamming techniques in order to distribute the virus to unsuspecting users. These emails contain attachments. Once the user opens the attachment, the Trojan Horse Virus immediately infects the system and performs the tasks mentioned above. Another method used by malware developers to spread their Trojan Horse viruses is via chat software such as Skype. Another method used by this virus in order to infect other machines is through sending copies of itself to the people in the address book of a user whose computer has already been infected by the virus.

A Trojan Horse virus The best way to prevent a Trojan Horse Virus from entering and infecting your computer is to never open email attachments or files that have been sent by unknown senders. However, not all files we can receive are guaranteed to be virus-free. With this, a good way of protecting your PC against malicious programs such as this harmful application is to install and update an anti-virus program.

The seven main types of Trojan horses are:

  • Remote Access Trojans
  • Data Sending Trojans
  • Destructive Trojans
  • Proxy Trojans
  • FTP Trojans
  • Security Software Disabling Trojans
  • Denial-of-Service Attack (DoS) Trojans

A Trojan horse, or Trojan, is a type of malware that masquerades as a legitimate file or helpful program possibly with the purpose of granting a hacker unauthorized access to a computer. Trojans do not attempt to inject themselves into other files like a computer virus. Trojan horses may steal information, or harm their host computer systems. Trojans may use drive-by downloads or install via online games or internet-driven applications in order to reach target computers. The term is derived from the Trojan Horse story in Greek mythology because Trojan horses employ a form of "social engineering," presenting themselves as harmless, useful gifts, in order to persuade victims to install them on their computers.
A virus that disguises itself as a useful program to sneak into the victims computer.
In Greek mythology, the Trojan horse was a devious plot used by the Greeks to gain access to the city of Troy. A large wooden horse was built and several dozen Greek warriors hid inside the horse. The Trojans thought the Greeks were signalling peace and the horse was a gift, so they brought the wooden horse inside the city gates. Late at night the Greek warriors snuck out of the horse, opened the gates and laid waste to the city of Troy.

In modern useage, a Trojan horse is a false gift - something given to another person with the intent of hurting them.

In computer useage, a Trojan horse is a type of virus that gains access to your computer by appearing innocent then wrecking havoc once it's in.
answer 2A 'Trojan Horse' virus is a common and difficult to remove threat to a computer. It is a virus that attempts to make the user think that it is actually beneficial. It hides within a seemingly useful software program, but once executed or installed into your system it will start infecting other files in your computer. It is also usually capable of stealing important information from your computer and could even able to gain a level of control over your computer through this virus.

Who is Paris in the Trojan war?

Paris is the Trojan Prince who decided between Hera, Athene, and Aphrodite and Thetis's wedding with the golden apple. He chose Aphrodite, who told him he would get the love of his life, witch turned out to be Helen from Sparta. It is because of Paris and Helen that the Trojan War was started.

What might had happened if the Trojans had overpowered the Greek soldiers as they emerged from the wooden horse?

The frustrated Greeks would have had to go home, laden with loot from Asia Minor, but without the richest pickings of Troy.

Why was it necessary for the Greek inside the horse to remain quiet?

So the Trojans would not know that they were in there, and kill them. The plan was to get the horse inside the city walls, and the Greeks in the horse would open the gates to let the Greek armies in.

What happens at the end of nine years of fighting with neither side victorious Trojan War?

After an initial failed attempt on Troy, the Achaeans went off to loot the Aegean Sea coast for nine years. After taking everything worth taking, they returned for another crack at the richest prize in the tenth year - Troy and this time succeeded.

Why is a basic understanding of the Trojan War and Greek culture essential?

A basic understanding of the Trojan War and Greek culture is essential because these narratives significantly shaped Western literature, art, and philosophy. The War, as depicted in works like Homer's "Iliad," explores themes of heroism, honor, and the human condition, influencing countless cultural references. Additionally, Greek culture introduced foundational concepts in democracy, ethics, and drama, which continue to resonate in modern society. This knowledge provides valuable context for understanding historical developments and cultural references that persist today.

Why are some computer viruses called Trojan horses?

A trojan horse is a type of malware that can deal damage to your data and your computer, and not really a "virus". Trojan horses get their name from the works of Homer that describes of the military strategy used against the Trojans in the Trojan War. The Greeks used a wooden horse filled with a small contingency of troops inside as a "gift". Once inside, the hidden troops will infiltrate and attack from the inside.

What happened to Agamemnon when he returned home from the Trojan War in Odysseus?

Odysseus was on his 10 year wanderings home, so he wasn't involver. Agamemnon was murdered by the boyfriend his wife had taken up with during his long absence.