Category: 

What is a Trojan Horse?

Modern Trojan horse programs take their name from the Greek story.
A Trojan horse may appear to be a piece of harmless software, but it includes malicious code.
Article Details
  • Written By: Sherry Holetzky
  • Edited By: Lindsay D.
  • Last Modified Date: 08 October 2014
  • Copyright Protected:
    2003-2014
    Conjecture Corporation
  • Print this Article
Free Widgets for your Site/Blog
Waking up in the middle of the night is normal for humans.  more...

October 31 ,  1984 :  Indira Gandhi, Prime Minister of India, was assassinated.  more...

Named for a giant horse that was supposed to be a gift but was filled with the Greek army, a Trojan horse program can be just as deceptive. The story goes that the Greeks gave the Trojans a huge wooden horse as a peace offering. The citizens of Troy accepted the gift, brought the horse inside the city, threw a victory bash, then went to bed. It wasn't until the Greek soldiers had set the city on fire that they realized they'd been had. A Trojan horse that affects computers can contain some nasty surprises as well. It can damage, delete, or destroy important files.

A Trojan horse may actually appear to be a useful application, which is why so many unsuspecting people download them. It might be disguised as a program intended to rid your computer of viruses, yet actually be used to infect your system instead. While the terms "virus" and "Trojan horse" are frequently used interchangeably, they are actually quite different. A virus replicates itself, while a Trojan horse does not.

Ad

Once a Trojan horse is activated, it can access files, folders, or your entire system. Commonly, Trojans create a "backdoor" or a "trapdoor," which can be used to send your personal information to another location. To protect your system, extensive anti-virus software is a good first step. Choose a program that looks for Trojan horses and worms as well as viruses, and make sure it updates definitions for each frequently. Also, make sure your anti-virus scans email, and gives an alert or automatically deletes any message that contains suspicious code, even if the code is not specific malware that the program has already identified.

The most effective option for protecting against a Trojan horse may be installing a firewall if you do not already have one. A good software firewall is usually the best type for a personal computer. It can be configured to keep intruders out while also keeping your system, or programs within your system, from sending out personal or confidential data.

If you are unsure, test drive a trial version of a firewall or download a free one to check it out. Run it for one day and examine the log file. You'll be shocked by the amount of information that goes in and out of your computer in twenty-four hours. You may even detect a Trojan or other malware that got past your anti-virus, since they are frequently difficult to detect.

Ad

More from Wisegeek

You might also Like

Discuss this Article

anon39880
Post 4

has anyone ever heard of TR/Dldr Agent.QGZ

anon34370
Post 3

can trojans infect external hard drives when they are plugged in, and then move to another computer via external hard drive?

anon33961
Post 2

haha, i found 2 trojan horse viruses on my computer but we got rid of them, it was kinda creepy, i was just looking at the affected areas thingy and there were all these porn websites from my user yuck.

anon3391
Post 1

what is hozytype.exe?

I can not find any info on the net about it or figure out how to delete it or get rid of it. It is appears to be only in program files\internet explorer and it comes up in Windows\prefetch

Post your comments

Post Anonymously

Login

username
password
forgot password?

Register

username
password
confirm
email