Trojan War
In Greek mythology, the Trojan War was waged against the city of Troy by the Achaeans (Greeks) after Paris of Troy took Helen from her husband Menelaus king of Sparta. The war is one of the most impor...
Trojan War - Wikipedia
Judgement of Paris
The Judgement of Paris is a story from Greek mythology, which was one of the events that led up to the Trojan War and (in slightly later versions of the story) to the foundation of Rome.
As with m...
Judgement of Paris - Wikipedia
ILiad
The iLiad was an electronic handheld device, or e-Reader, which could be used for document reading and editing. Like the Barnes and Noble nook, Sony Reader or Amazon Kindle, the iLiad made use of an ...
ILiad - Wikipedia
Trojan horse (computing)
A Trojan horse, or Trojan, in computing is a generally a non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the...
Returns from Troy
The Returns from Troy are the stories of how the Greek leaders returned after their victory in the Trojan War. Many Achaean heroes did not return to their homes, but died or founded colonies outside t...
Returns from Troy - Wikipedia
Odyssey
The Odyssey (/ˈɒdəsi/; Greek: Ὀδύσσεια, Odýsseia) is one of two major ancient Greek epic poems attributed to Homer. It is, in part, a sequel to the Iliad, the other work ascribed to Homer. The poem is...
Odyssey - Wikipedia
Telegony
The Telegony (Greek: Τηλεγόνεια, Tēlegoneia; Latin: Telegonia) is a lost ancient Greek epic poem about Telegonus, son of Odysseus by Circe. His name ("born far away") is indicative of his birth o...
Historicity of the Iliad
The extent of the historical basis of the Iliad has been a topic of scholarly debate for centuries. While researchers of the 18th century had largely rejected the story of the Trojan War as fable, the...
Historicity of the Iliad - Wikipedia
Trojan War in popular culture
There is a wide range of ways in which people have represented the Trojan War in popular culture.
The pre-war episodes of Leda and the Swan and the Judgement of Paris were frequent subjects in art...
Geography of the Odyssey
Events in the main sequence of the Odyssey (excluding the narrative of Odysseus's adventures) take place in the Peloponnese and in what are now called the Ionian Islands (Ithaca and its neighbours). ...
Geography of the Odyssey - Wikipedia
MP3Concept
MP3Concept is the first trojan horse for Mac OS X, created around April 2004. MP3Concept is benign, it was designed as a proof of concept regarding how a file can be disguised to an end user in a GUI ...
Alureon
Alureon (also known as TDSS) is a trojan and bootkit which is designed, amongst other things, to steal data by intercepting a system's network traffic and searching it for usernames, passwords and cre...
EGABTR
EGABTR, sometimes pronounced "Eggbeater", was a Trojan horse program that achieved some level of notoriety in the late 1980s and early 1990s. Allegedly a graphics utility that would improve the qualit...
Trojan.Zonebac
Trojan.Zonebac is a trojan horse which lowers the security zone settings of Internet Explorer on the affected computer. Before 20 September 2006, it was known as Trojan.Lowzone. It is regarded as a lo...
Odysseus
Odysseus (/oʊˈdɪsiəs, oʊˈdɪsjuːs/; Greek: Ὀδυσσεύς [odysˈsews]), also known by the Latin name Ulysses (/juːˈlɪsiːz/; Latin: Ulyssēs, Ulixēs), was a legendary Greek king of Ithaca and a hero of Hom...
Odysseus - Wikipedia
Clickbot.A
Clickbot.A is a piece of malware, an internet bot that is used for click fraud.The bot was first discovered by Swa Frantzen at SANS' Internet Storm Center in May 2006. At that time, the botnet had in...
Twelve Tricks
Twelve Tricks is a trojan horse that first appeared around 1990.Purdue University issued a bulletin about the trojan on March 8, 1990. The trojan came in an altered utility file called CORETEST.COM, w...
Backdoor Shell
A backdoor shell is a malicious piece of code (e.g. PHP, Python, Ruby) that can be uploaded to a site to gain access to files stored on that site. Once it is uploaded, the hacker can use it to edit, d...
Bifrost (trojan horse)
Bifrost is a backdoor trojan horse family of more than 10 variants which can infect Windows 95 through Windows 7. Bifrost uses the typical server, server builder, and client backdoor program configura...
RavMonE.exe
RavMonE, known more correctly as RJump, is a Trojan that opens a backdoor on computers running Microsoft Windows. Once a computer is infected, the virus allows unauthorized users to gain access to the...
Zeus (trojan horse)
Zeus, ZeuS, or Zbot is Trojan horse computer malware that runs on versions of the Microsoft Windows. While it is capable of being used to carry out many malicious and criminal tasks, it is often used...
Zeus (trojan horse) - Wikipedia
Graybird
Graybird is a Trojan horse that hides its presence on the compromised computer and downloads files from remote Web sites. There are many variations of this virus such as Backdoor.Graybird.P (the most...
ClipGenie
ClipGenie is an adware program that "brings rich media content to you, directly to your hard drive. Now you can get all the best movies, games and programs downloaded directly to your computer ... whi...
Zlob trojan
The Zlob Trojan, identified by some antiviruses as Trojan.Zlob, is a Trojan horse which masquerades as a needed video codec in the form of ActiveX. It was first detected in late 2005, but only started...
Clampi
Clampi is a man-in-the-browser trojan that steals financial information from companies that are sent to hackers to use for fraud scams. The virus has been around since 2007 and only affects Microsoft ...
NetBus
NetBus or Netbus is a software program for remotely controlling a Microsoft Windows computer system over a network. It was created in 1998 and has been very controversial for its potential of being us...
AIDS (trojan horse)
AIDS, also known as Aids Info Disk or PC Cyborg Trojan, is a trojan horse that replaces the AUTOEXEC.BAT file, which would then be used by AIDS to count the number of times the computer has booted. On...