trojan horse

listen to the pronunciation of trojan horse
English - Turkish
Truva atı

Bu yeni işletim sistemi tam anlamıyla bir Truva atıdır. - This new operating system is literally a Trojan horse.

Ben bir Truva atıyım, yani Mac bilgisayarınıza bulaştım. - I am a Trojan horse, so I have infected your Mac computer.

truva atı

Ben bir Truva atıyım, yani Mac bilgisayarınıza bulaştım. - I am a Trojan horse, so I have infected your Mac computer.

Bu yeni işletim sistemi tam anlamıyla bir Truva atıdır. - This new operating system is literally a Trojan horse.

Trojan horse program
Truva ati programi
The Trojan horse
truva atı
English - English
a social movement, political bill, or ideology with a negative agenda or evil intentions under the guise of positive values or good intentions

Indeed, it may turn out to be a Trojan horse that finally allows conservative ideologues, who have unsuccessfully laid siege to Medicare since the days of Barry Goldwater, to breach its political defenses.

a subversive person or device placed within the ranks of the enemy
an offer made to lure customers, seeming like a good deal, that has the ultimate effect of extorting large amounts of money from the customer
a hollow wooden horse by which the Greeks gained access to Ilium or Troy
a malicious program that is disguised as legitimate software

Worse than what could be observed about the program was the fear that it might be a Trojan horse program -- apparently innocent, but carrying a string of code instructing the computer to carry out a specific damaging instruction at some later time.

{i} large wooden horse which contained Greek warriors who surprise attacked the Trojans (Classical Mythology); something which is ostensibly good but brings harm; computer program which looks useful but contains a harmful code
A Trojan horse is a computer virus which is inserted into a program or system and is designed to take effect after a particular period of time or a certain number of operations. the Trojan Horse a wooden horse used by Greek soldiers to trick their enemies the Trojans during the Trojan War. The Greeks hid inside a large wooden model of a horse and were taken into Troy by Trojan soldiers, who thought that it was a gift
disapproval If you describe a person or thing as a Trojan horse, you mean that they are being used to hide someone's true purpose or intentions. Was Colombo the emissary of Pope Paul, his Trojan horse within the Commission?
A seemingly harmless computer virus that turns out to be extremely destructive
A computer program that appears to perform a valid function but contains, hidden in its code, instructions that cause damage to computer systems Strictly speaking, Trojan Horses are not viruses because they do not replicate back to top
A destructive program that masquerades as a benign application Unlike a virus, Trojan horses do not replicate themselves but they can be just as destructive One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer
A destructive program that masquerades as a benign application Unlike a viruses, Trojan horses do not replicate themselves but they can be just as destructive One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer
A computer program that carries within itself a means to allow the creator of the program access to the system using it See also virus, worm
Program with secret functions in it that surreptitiously access information without the operator's knowledge, usually to circumvent security protections
An insidious and usually illegal computer program that masquerades as a program that is useful, fun, or otherwise desirable for users to download Once the program is run, it performs a destructive act This usage is derived from the wooden horse in which, according to legend, the Greeks hid and gained access to Troy
A program that doesn't necessarily replicate itself, but like the legendary wooden horse is much more than it appears A Trojan horse program might look like a game, but instead it steals your personal information and sends it to a criminal
A Trojan Horse is a program in which malicious code is contained in apparently harmless programming A Trojan Horse can be considered a virus if it is distributed widely
A software program that appears to contain a useful application but actually holds an undesired program such as a virus
a subversive group that supports the enemy and engages in espionage or sabotage; an enemy in your midst
In computers, a Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk In one celebrated case, a Trojan horse was a program that was supposed to find and destroy computer viruses A Trojan horse can be considered a virus if it is widely redistributed
An apparently useful and innocent program containing additional hidden code which allows the unauthorized collection, exploitation, falsification, or destruction of data
a large hollow wooden figure of a horse (filled with Greek soldiers) left by the Greeks outside Troy during the Trojan War
-A malicious program that disguises itself as a beneficial or entertaining program but that actually damages a computer or installs code that can counteract security measures (perhaps by collecting passwords) or perform other tasks (such as launching a distributed denial of service attack) Unlike a computer virus, a Trojan horse does not replicate itself
is a computer program where the programmer intends that does something undocumented that the programmer intended, but that some users would not approve of if they knew about it According to some people, a virus is a particular case of a Trojan Horse, namely one which is able to spread to other programs (i e , it turns them into Trojans too) According to others, a virus that does not do any deliberate damage (other than merely replicating) is not a Trojan Finally, despite the definitions, many people use the term "Trojan" to refer only to non-replicating malware, so that the set of Trojans and the set of viruses are disjoint
1) Program containing hidden code allowing the unauthorized collection, falsification, or destruction of information 2) A malicious program such as a virus or a worm, hidden in an innocent-looking piece of software, usually for the purpose of unauthorized collection, alteration, or destruction of information
A program designed to emulate another program (such as /bin/login) with the express intent of using the data it receives in a way that negatively impacts your productivity
A destructive program that masquerades as a harmless one When you run a Trojan horse program, believing that it has a useful function, it will instead, for example, erase your hard drive See virus and worm
A destructive program that masquerades as a benign application Unlike viruses Trojan horses do not replicate themselves but they can be just as destructive
Also just "Trojan" A program that may pretend to have, or is described as having, a set of useful or desirable features, but can actually cause some damage Trojans are not technically viruses, since they do not replicate
a program that appears desirable but actually contains something harmful; "the contents of a trojan can be a virus or a worm"; "when he downloaded the free game it turned out to be a trojan horse"
An apparently useful and innocent program containing additional hidden code, which allows the unauthorized collection, exploitation, falsification, or destruction of data
Trojan is a program that does something undocumented that the programmer intended, but that some users would not approve of if they knew about it According to some people, a virus is a particular case of a Trojan, namely one which is able to spread to other programs According to others, a virus that does not do any deliberate damage is not a Trojan Finally, despite the definitions, many people use the term "Trojan" to refer only to *non-replicating* malware, so that the set of Trojans and the set of viruses are disjoint
A malicious, security-breaking program that is disguised as something benign, such as a directory lister, archiver, game or (in one notorious 1990 case on the Mac) a program to find and destroy viruses V: Vaporware Products announced far in advance of any release
A type of virus that pretends to be a useful program, such as a game or a utility program, whn in reality it contains special code that will intentionally damage any system onto which it is loaded
A Trojan Horse is a seemingly-innocent program that contains and conceals harmful code When a Trojan Horse is opened, the malicious code performs its damage on the unsuspecting computer
Trojan horses
plural form of Trojan horse
trojan horse

    Hyphenation

    Tro·jan horse

    Turkish pronunciation

    trōcın hôrs

    Pronunciation

    /ˈtrōʤən ˈhôrs/ /ˈtroʊʤən ˈhɔːrs/

    Etymology

    [ 'trO-j&n ] (noun.) 14th century. Middle English, from Latin trojanus of Troy, from Troia, Troja Troy, from Greek TrOïa.
Favorites