Trojan horse

Also found in: Dictionary, Medical, Financial, Acronyms, Idioms, Encyclopedia, Wikipedia.
Related to Trojan horse: Trojan War
Graphic Thesaurus  🔍
Display ON
Animation ON
  • noun

Synonyms for Trojan horse

a subversive group that supports the enemy and engages in espionage or sabotage

a program that appears desirable but actually contains something harmful


Related Words

a large hollow wooden figure of a horse (filled with Greek soldiers) left by the Greeks outside Troy during the Trojan War

References in periodicals archive ?
The council said in a statement: "We are concerned to ensure that there are no misleading messages given about what really happened during Trojan Horse, and to make it clear that the city council in no way endorses the planned event.
Turnbull "Some people are lucky and have a Trojan horse on their computer which hasn't been accessed by criminals, but others are not so lucky and have bank details stolen, software and data corrupted, and key strokes logged for passwords.
The House members of the Liberal Party who joined the super majority do not constitute a Trojan horse.
Back in the day, Guv Meldrim Thomson tours the premises of Epsom's Trojan Horse and Graveyard of Captive Nations.
HORSING AROUND Miles Harrison with his Trojan horse sculpture in his parents' garden
This Trojan horse was found in pirated software distributed via BitTorrent sites.
It connects to a remote server over the Internet, which means that a malicious user will be alerted that the Trojan horse is installed on different Macs and will be able to connect to them and perform various actions remotely.
The Trojan horse, when run, activates ssh on the Mac on which it is running, then sends the user name and password hash, along with the IP address of the Mac, to a server.
And when Notre Dame scores, he said, the green leprechaun ``will chase that Trojan horse .
In such attacks, virus writers craft Trojan horse programs to sneak into computers and steal documents.
Ron Paul of Texas, one of eight House Republicans who voted against the measure, says the legislation is a Trojan horse.
Historically accurate elements abound, such as the building of the Trojan horse and Cassandra's gift of prophecy, but it is McLaren's fictional embellishments, such as the unlikely friendship between Helen and Cassandra, that enliven the tale.
But on March 20, 2004, a "proof of concept" Trojan horse named MP3Concept (file name MP3Virus.
An important distinction between Trojan horse programs and true viruses is that Trojan horses do not replicate themselves.
Whether formulating a strategy to protect against a Trojan horse or a Hurricane Isabel, virus protection is just one piece of a company's overall disaster recovery plan.