Web Results
A retelling of the events leading to the use of the Trojan Horse, to bring down the great city of Troy... More>>

en.wikipedia.org/wiki/Trojan_Horse

The Trojan Horse is a tale from the Trojan War about the subterfuge that the Greeks used to enter the city of Troy and win the war. In the canonical version, after ...

en.wikipedia.org/wiki/Trojan_horse_(computing)

In computing, Trojan horse, or Trojan, is a malicious computer program which is used to hack into a computer by misleading users of its true intent. It works in ...

www.britannica.com/topic/Trojan-horse

Trojan horse: huge hollow wooden horse constructed by the Greeks to gain entrance into Troy during the Trojan War. The horse was built by Epeius, a master ...

quatr.us/greeks/religion/myths/trojanhorse.htm

April 2016 - After the events of the Iliad and the death of Hector, the Trojan War still wasn't over. Neither the Greeks nor the Trojans seemed to be able to win, ...

www.ask.com/youtube?q=Trojan+Horse&v=Td1uPq9K--E
May 26, 2015 ... Top Scene4u 1,408,811 views · 8:00. Achilles & his Myrmidons take the Trojan beachhead [TROY-1080p] - Duration: 5:07. C1r 1,042,313 views.

searchsecurity.techtarget.com/definition/Trojan-horse

Apr 22, 2016 ... In computing, a Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data.

greece.mrdonn.org/trojanwar.html

This saying comes from the legend of the Trojan Horse. As the story goes ...... A long time ago, there was an ancient city-state on the coast of Turkey, across the ...

www.avg.com/en/signal/what-is-a-trojan

Jun 6, 2015 ... Trojan malware takes its name from the classical story of the Trojan horse, because it imitates the technique to infect computers. A Trojan will ...

www.webopedia.com/TERM/T/Trojan_horse.html

A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.