Trojan War
In Greek mythology, the Trojan War was waged against the city of Troy by the Achaeans (Greeks) after Paris of Troy took Helen from her husband Menelaus king of Sparta. The war is one of the most impor...
Trojan War - Wikipedia
Judgement of Paris
The Judgement of Paris is a story from Greek mythology, which was one of the events that led up to the Trojan War and (in slightly later versions of the story) to the foundation of Rome.
As with m...
Judgement of Paris - Wikipedia
ILiad
The iLiad was an electronic handheld device, or e-Reader, which could be used for document reading and editing. Like the Barnes and Noble nook, Sony Reader or Amazon Kindle, the iLiad made use of an ...
ILiad - Wikipedia
Trojan horse (computing)
A Trojan horse, or Trojan, in computing is a generally a non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the...
Returns from Troy
The Returns from Troy are the stories of how the Greek leaders returned after their victory in the Trojan War. Many Achaean heroes did not return to their homes, but died or founded colonies outside t...
Returns from Troy - Wikipedia
Odyssey
The Odyssey (/ˈɒdəsi/; Greek: Ὀδύσσεια, Odýsseia) is one of two major ancient Greek epic poems attributed to Homer. It is, in part, a sequel to the Iliad, the other work ascribed to Homer. The poem is...
Odyssey - Wikipedia
Telegony
The Telegony (Greek: Τηλεγόνεια, Tēlegoneia; Latin: Telegonia) is a lost ancient Greek epic poem about Telegonus, son of Odysseus by Circe. His name ("born far away") is indicative of his birth o...
Historicity of the Iliad
The extent of the historical basis of the Iliad has been a topic of scholarly debate for centuries. While researchers of the 18th century had largely rejected the story of the Trojan War as fable, the...
Historicity of the Iliad - Wikipedia
Trojan War in popular culture
There is a wide range of ways in which people have represented the Trojan War in popular culture.
The pre-war episodes of Leda and the Swan and the Judgement of Paris were frequent subjects in art...
Geography of the Odyssey
Events in the main sequence of the Odyssey (excluding the narrative of Odysseus's adventures) take place in the Peloponnese and in what are now called the Ionian Islands (Ithaca and its neighbours). ...
Geography of the Odyssey - Wikipedia
MP3Concept
MP3Concept is the first trojan horse for Mac OS X, created around April 2004. MP3Concept is benign, it was designed as a proof of concept regarding how a file can be disguised to an end user in a GUI ...
English translations of Homer
This is a list of English translations of Homer—that is, of the Iliad and Odyssey—chronologically ordered by date of first publication, with first lines often provided to illustrate the style of the t...
Beast (trojan horse)
Beast is a Windows-based backdoor trojan horse, more commonly known in the underground hacking community as a Remote Administration Tool or RAT. It is capable of infecting versions of Windows from 95 ...
Alureon
Alureon (also known as TDSS) is a trojan and bootkit which is designed, amongst other things, to steal data by intercepting a system's network traffic and searching it for usernames, passwords and cre...
EGABTR
EGABTR, sometimes pronounced "Eggbeater", was a Trojan horse program that achieved some level of notoriety in the late 1980s and early 1990s. Allegedly a graphics utility that would improve the qualit...
Clickbot.A
Clickbot.A is a piece of malware, an internet bot that is used for click fraud.The bot was first discovered by Swa Frantzen at SANS' Internet Storm Center in May 2006. At that time, the botnet had in...
Odysseus
Odysseus (/oʊˈdɪsiəs, oʊˈdɪsjuːs/; Greek: Ὀδυσσεύς [odysˈsews]), also known by the Latin name Ulysses (/juːˈlɪsiːz/; Latin: Ulyssēs, Ulixēs), was a legendary Greek king of Ithaca and a hero of Hom...
Odysseus - Wikipedia
Backdoor Shell
A backdoor shell is a malicious piece of code (e.g. PHP, Python, Ruby) that can be uploaded to a site to gain access to files stored on that site. Once it is uploaded, the hacker can use it to edit, d...
Bifrost (trojan horse)
Bifrost is a backdoor trojan horse family of more than 10 variants which can infect Windows 95 through Windows 7. Bifrost uses the typical server, server builder, and client backdoor program configura...
RavMonE.exe
RavMonE, known more correctly as RJump, is a Trojan that opens a backdoor on computers running Microsoft Windows. Once a computer is infected, the virus allows unauthorized users to gain access to the...
Onlinestability.com Trojan
Onlinestability.com Trojan or Adware.W32.ExpDwnldr is a malware trojan that uses fake pop up ads to force the infected victim to buy malicious software to repair it.
The virus tampers with the com...
Bohmini.A
Bohmini.A is a configurable remote access tool or Trojan.Bohmini.A exploits security flaws in Adobe Flash 9.0.115 with Internet Explorer 7.0 and Firefox 2.0 under Windows XP SP2. Adobe Flash 9.0.124 ...
Zeus (trojan horse)
Zeus, ZeuS, or Zbot is Trojan horse computer malware that runs on versions of the Microsoft Windows. While it is capable of being used to carry out many malicious and criminal tasks, it is often used...
Zeus (trojan horse) - Wikipedia
Graybird
Graybird is a Trojan horse that hides its presence on the compromised computer and downloads files from remote Web sites. There are many variations of this virus such as Backdoor.Graybird.P (the most...
PGPCoder
PGPCoder or GPCode is a trojan that encrypts files on the infected computer and then asks for a ransom in order to release these files, a type of behavior dubbed ransomware or cryptovirology.
Once...
ClipGenie
ClipGenie is an adware program that "brings rich media content to you, directly to your hard drive. Now you can get all the best movies, games and programs downloaded directly to your computer ... whi...
Zlob trojan
The Zlob Trojan, identified by some antiviruses as Trojan.Zlob, is a Trojan horse which masquerades as a needed video codec in the form of ActiveX. It was first detected in late 2005, but only started...
OSX.RSPlug Trojan
The RSPlug Trojan horse, a form of DNSChanger, is malware targeting the Mac OS X operating system. The first incarnation of the trojan, OSX.RSPlug.A, was discovered on October 30, 2007 by the Mac secu...
Vundo
The Vundo Trojan (commonly known as Vundo, Virtumonde or Virtumondo, and sometimes referred to as MS Juan) is either a Trojan horse or a computer worm that is known to cause popups and advertising for...