We are using cookies This website uses cookies in order to offer you the most relevant information. By browsing this website, you accept these cookies.
Did you know? You can double click on a word to look it up on TermGallery.
Meanings of trojan horses in English
We have no meanings for "trojan horses" in our records yet.
Usage of trojan horses in English
1
The gypsies breed Trojanhorses and sell the offspring to young girls.
2
Common examples of malware include viruses, worms, Trojanhorses, and spyware.
3
Most Trojanhorses cannot be spotted in advance by anti-virus programs.
4
This herd of Trojanhorses soon started running wild and biting the Russian bear.
5
It wasn't the year those devices took over our homes, but-don'tlook now-thereare suddenly Trojanhorses everywhere.
6
Cervenka's specialty is creating client-side Trojanhorses, programs that run on a user's computer and perform hidden functions.
7
We'll have no Trojanhorses here.
8
It is ingenious to describe such a woman, smuggling a rebel in her belly, as a Trojanhorses.
9
Mitchell says some of the devices could even be used as digital Trojanhorses to introduce malware into a police station.
10
Posing as traitorous employees of the American military-industrial complex, FBI officers sent a procession of technological Trojanhorses to Soviet spies.
11
Using these Trojanhorses, cybercrooks have been intercepting victims' web-banking credentials and then initiating money transfers to mules around the country.
12
We needed to make up our minds quickly whether we would be Trojanhorses in this political coalition or converts to conservatism.
13
The profile of the average refugee entering the US sharply contrasts with the ominous image of terrorist Trojanhorses conjured up by Trump.
14
Security experts say that users trading files over IRC often unwittingly download Trojanhorses that allow hackers to exploit their victims' computers as weapons.
15
The FTC, in June, charged that 3FN actively recruited criminals to distribute spyware, viruses, Trojanhorses, phishing e-mails and pornography featuring children and animals.
16
Instead, the company uses Amazon's EC2 to analyze malicious code for patterns that can help its product, Immunet Protect, recognize viruses and Trojanhorses.