Trojan horse software - translation to russian
Diclib.com
ChatGPT AI Dictionary
Enter a word or phrase in any language 👆
Language:

Translation and analysis of words by ChatGPT artificial intelligence

On this page you can get a detailed analysis of a word or phrase, produced by the best artificial intelligence technology to date:

  • how the word is used
  • frequency of use
  • it is used more often in oral or written speech
  • word translation options
  • usage examples (several phrases with translation)
  • etymology

Trojan horse software - translation to russian

TYPE OF MALWARE
Anti Trojan; Anti-Trojan; Antitrojan; Antitrojan software; Trojan horse program; Trojan Remover; Trojan Horse (Computing); Pctrojan; Trojan Virus; Trojan horse (virus); Trojan virus; Trojan (computer security); Trojan horse virus; Parasitic trojan; Trojan horse (computer); Scamware; Play Mp3; Trojan worm; Trojan horse (software); Trojan computer virus; Trojan (computing); Trojan Horse (computing); Computer trojan; Web Trojans; Play mp3.exe (trojan); Computer Trojan; Trojan (computer virus); Momovirus; Trojan software; Internet Trojan; Trojan horses (computer); Trojan downloader; Trojan horse (Computing); TrojWare; Trojanware; Trojan (malware); Computing Trojan horse; Trojan (software)

Trojan horse software      
программа "Троянский конь", троянская программа
Trojan Horse program         
программа "Троянский конь"
Trojan horse         
  • The Phoenician ship called ''hippos'', from the Assyrian city of Khorsabad, 8th century BC
  • The [[Mykonos vase]] (750 to 650 BC), with one of the earliest known renditions of the Trojan Horse (note the depiction of the faces of hidden warriors shown on the horse's side)
  • Sinon is brought to Priam, from folio 101r of the [[Roman Vergil]].
  • A replica of the Trojan Horse stands today in Turkey, the modern day location of the city of Troy.
TALE FROM TROJAN WAR
Trojan horses; Trojan Horses; Trojan horse; The trojan horse; The Trojan Horse; Gift horse; Trojan-horse; Wooden horse of Troy; Artistic representations of the Trojan Horse

общая лексика

"Троянский конь"

разновидность вирусного ПО, которое маскируется под обычную программу (широко используемую утилиту), но содержит код, наносящий вред системе, в которой она загружается, или программу "взлома" сети (нарушения безопасности системы). Термин "Троянский конь" был впервые использован хакером Даном Эдвардсом, позднее ставшим сотрудником Агентства национальной безопасности. Термин подчёркивает аналогию с известным греческим "подарком" городу Трое, составляющим основу знаменитого мифа о падении этого города. В отличие от обычных компьютерных вирусов, "троянцы", как правило, не могут саморазмножаться

коммерческая программа, содержащая множество недокументированных возможностей

разговорное выражение

троянец

Definition

ТРОЯН
город в центральной части Болгарии, на р. Осым. 25 тыс. жителей (1992). Машиностроение, фармацевтическая, деревообрабатывающая промышленность. Ремесла. Бальнеологический курорт. Близ Трояна - Троянский монастырь (16 в.).
---
Иван Иванович (1898-1944) , участник Движения Сопротивления во Франции, русский морской офицер, эмигрант. Сражался в составе Интербригады в Испании. Казнен фашистами.

Wikipedia

Trojan horse (computing)

In computing, a Trojan horse is any malware that misleads users of its true intent by disguising itself as a standard program. The term is derived from the ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.

Trojans generally spread by some form of social engineering. For example, where a user is duped into executing an email attachment disguised to appear innocuous (e.g., a routine form to be filled in), or by clicking on some fake advertisement on social media or anywhere else. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller who can then have unauthorized access to the affected computer. Ransomware attacks are often carried out using a Trojan.

Unlike computer viruses and worms, Trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves.

Examples of use of Trojan horse software
1. The client companies and their management have also denied any knowledge of the use of Trojan horse software.
2. The pair are accused of writing the Trojan horse software used by Israeli detective agencies to commit industrial espionage.
3. Investigators told him that they had documents which had been illegally removed from several law offices using Trojan horse software.
4. The investigation agency used Trojan horse software to spy on 33 companies, including firms like the Hot cable company, Steimatzky book store chain and Globes newspaper.
5. Or Shachar is one of the executives suspected of having commissioned espionage against a rival firm – in his case, car importer Champion Motors – via Trojan horse software.
What is the Russian for Trojan horse software? Translation of &#39Trojan horse software&#39 to Russi