Overview of Trojan horses


Explanation

Introduction

A Trojan horse program conceals hidden programming. The hidden function may just be a joke or something annoying, but vandals often use Trojan horses to destroy other people's data. These individuals know that some people will run any program that has an interesting file name or promises to perform a useful function.

The threat

  • A program that conceals hidden programming
  • The hidden function may just be a joke or designed to destroy your data
  • Preys on people by using an interesting file name or promises to perform a useful function

See also

For more information, refer to our recommended practices and instructions for removing an infection.