![]() ![]() It should be noted that while some claim that Trojan horses are viruses, they are really their own classification of malware. And much like the Greek soldiers in the horse, the creators of the Trojan horse will have inside access to your computer. ![]() Once downloaded, opened and executed on a computer, the Trojan horse becomes activated. It tricks users into thinking that it is legitimate software and it may very well look that way even to trained eyes. ![]() Much like the ancient Trojan horse, modern Trojan horse malware uses the same tactic the Greeks used. This horse was filled with Greek soldiers and once nightfall came, the soldiers poured out and put Troy to the sword.īut enough with the history lesson. In a successful ploy to breach the impregnable city wall of Troy, the Greeks gave the Trojans a gift of a massive, hollow horse made of wood. In this epic poem, the Greek city-states went to war with Troy in response to the kidnapping of the beautiful Helen. Homer’s “The Iliad” described the Trojan War of the eastern Mediterranean in the 12th century B.C. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |