truva ati

listen to the pronunciation of truva ati
Turkish - English
trojan horse
A seemingly harmless computer virus that turns out to be extremely destructive
A destructive program that masquerades as a benign application Unlike a virus, Trojan horses do not replicate themselves but they can be just as destructive One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer
A destructive program that masquerades as a benign application Unlike a viruses, Trojan horses do not replicate themselves but they can be just as destructive One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer
A computer program that carries within itself a means to allow the creator of the program access to the system using it See also virus, worm
Program with secret functions in it that surreptitiously access information without the operator's knowledge, usually to circumvent security protections
An insidious and usually illegal computer program that masquerades as a program that is useful, fun, or otherwise desirable for users to download Once the program is run, it performs a destructive act This usage is derived from the wooden horse in which, according to legend, the Greeks hid and gained access to Troy
A program that doesn't necessarily replicate itself, but like the legendary wooden horse is much more than it appears A Trojan horse program might look like a game, but instead it steals your personal information and sends it to a criminal
A Trojan Horse is a program in which malicious code is contained in apparently harmless programming A Trojan Horse can be considered a virus if it is distributed widely
A software program that appears to contain a useful application but actually holds an undesired program such as a virus
a subversive group that supports the enemy and engages in espionage or sabotage; an enemy in your midst
In computers, a Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk In one celebrated case, a Trojan horse was a program that was supposed to find and destroy computer viruses A Trojan horse can be considered a virus if it is widely redistributed
An apparently useful and innocent program containing additional hidden code which allows the unauthorized collection, exploitation, falsification, or destruction of data
a large hollow wooden figure of a horse (filled with Greek soldiers) left by the Greeks outside Troy during the Trojan War
-A malicious program that disguises itself as a beneficial or entertaining program but that actually damages a computer or installs code that can counteract security measures (perhaps by collecting passwords) or perform other tasks (such as launching a distributed denial of service attack) Unlike a computer virus, a Trojan horse does not replicate itself
is a computer program where the programmer intends that does something undocumented that the programmer intended, but that some users would not approve of if they knew about it According to some people, a virus is a particular case of a Trojan Horse, namely one which is able to spread to other programs (i e , it turns them into Trojans too) According to others, a virus that does not do any deliberate damage (other than merely replicating) is not a Trojan Finally, despite the definitions, many people use the term "Trojan" to refer only to non-replicating malware, so that the set of Trojans and the set of viruses are disjoint
1) Program containing hidden code allowing the unauthorized collection, falsification, or destruction of information 2) A malicious program such as a virus or a worm, hidden in an innocent-looking piece of software, usually for the purpose of unauthorized collection, alteration, or destruction of information
A program designed to emulate another program (such as /bin/login) with the express intent of using the data it receives in a way that negatively impacts your productivity
A destructive program that masquerades as a harmless one When you run a Trojan horse program, believing that it has a useful function, it will instead, for example, erase your hard drive See virus and worm
A destructive program that masquerades as a benign application Unlike viruses Trojan horses do not replicate themselves but they can be just as destructive
Also just "Trojan" A program that may pretend to have, or is described as having, a set of useful or desirable features, but can actually cause some damage Trojans are not technically viruses, since they do not replicate