Skip to Content
Microsoft® Windows® 2000 Security Handbook
book

Microsoft® Windows® 2000 Security Handbook

by Jeff Schmidt
August 2000
Intermediate to advanced
800 pages
21h 5m
English
Que
Content preview from Microsoft® Windows® 2000 Security Handbook

Trojan Programs

The Trojan horse was an instrument of war used by the Greeks to gain access to the city of Troy during the mythical Trojan War. To further their siege of Troy, the Greeks built a huge wooden horse, hid a few Greek warriors in the horse, and offered the horse as a gift of surrender to the Trojans. The Trojans, thinking they were victorious, gladly opened their gates and brought the horse inside. Later that night, the Greek warriors hidden in the horse slipped out and opened the city's gates to let the rest of the Greek army into Troy. The city of Troy quickly fell. This is a fitting topic to discuss now, as the Trojans fell victim to a form of social engineering.

Distribution

A Trojan program presents itself disguised as some benign ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Windows Server® 2008 Security Resource Kit

Windows Server® 2008 Security Resource Kit

Jesper M. Johansson
Windows Server® 2008 Active Directory® Resource Kit

Windows Server® 2008 Active Directory® Resource Kit

Conan Kezema Stan Riemer Mike Mulcare, Byron Wright, and Microsoft Active Directory

Publisher Resources

ISBN: 0789719991Purchase book