Trojan horse
A Trojan or Trojan horse is a program appearing to be safe but performs malicious tasks (e.g., giving access to your computer). Trojan horses are one of the most common methods a computer criminal uses to infect your computer and collect personal information from your computer.
How a computer might get a Trojan horse
Below are some basic examples of how your computer could become infected with a Trojan horse.
A site offers a free download to a program or game that normally costs money. Downloading the pirated program or game lets you illegally use to play it; however, during the installation, it also installs a Trojan horse on the computer.
A popular screen saver website has become infected or uploaded infected screen savers. Downloading the screen saver to your computer also installs a Trojan horse onto the computer.
You receive an e-mail that appears to be from a friend asking you to view this fantastic new program or look at a file. Opening the file infects your computer with a Trojan horse.
A friend's Facebook account is hacked and sends personalized messages to friends to see this exciting new video. Opening the video requires a download with a hidden Trojan horse that infects your computer.
How can I remove a Trojan horse?
See the following link if you believe you've been infected with a trojan horse or other malware.
How can I create a Trojan horse?
Computer Hope doesn't help users create malicious software, including Trojan horses. The following page provides reasons why you should not create malicious software and alternatives to what you should do.
Backdoor, Cloaking, Computer crime, Computer slang, Cyberwar, Malware, Ransomware, RAT, Security terms, Spyware, Threat, Virus, Worm