Texas Tech University.
TTU Home Safe Computing Practices Lubbock Community Critical Topics Viruses, Worms, & Trojan Horses
logo small

Trojan Horses


A Trojan horse program conceals hidden programming. The hidden function may just be a joke, or something annoying, but vandals often use Trojan horse programs to destroy other people's data. These individuals know that some people will run any program that has an interesting file name, or promises to perform a useful function.

The Threat

Recommended Practices

Removing the Infection