Chapter 8: Trojan Horses-- Beware of Geeks Bearing Gifts

OVERVIEW

It's strange that men should take up crime when there are so many legal ways to be dishonest.

--SUNSHINE MAGAZINE

TROJAN HORSES ARE NAMED AFTER THE FAMOUS RUSE IN WHICH THE ANCIENT GREEKS LEFT A GIANT WOODEN HORSE BY THE GATES OF TROY AND SAILED AWAY AS IF THEY HAD GIVEN UP AFTER TEN LONG AND GRUELING YEARS OF WAR. Thinking the Trojan horse was a gift to the gods and a symbol of the Greek defeat, the people of Troy pulled the horse into their city. Later that night, Greek soldiers—who had been hiding inside the wooden horse—snuck out, attacked the Trojan guards, and opened the gates of the city to their returning army.

In the computer world, a Trojan horse is any program that masquerades as something else while concealing its true purpose. The main difference between a virus, a worm, and a Trojan horse is that a Trojan horse cannot spread by itself, but instead relies on unwary users to spread it far and wide.



Steal This Computer Book 3(c) What They Won't Tell You About the Internet
Steal This Computer Book 3: What They Wont Tell You about the Internet
ISBN: 1593270003
EAN: 2147483647
Year: 2003
Pages: 215
Authors: Wallace Wang

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net