- Trojan horse attack
- действие (нарушителя) с использованием программы "Троянский конь"
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Trojan horse — Tro jan horse , n. [from the incident described in Homer s Iliad.] 1. (Classical mythology) a large hollow wooden horse built by Greek soldiers besieging Troy during the Trojan War, and left as a gift when they pretended to abandon their seige.… … The Collaborative International Dictionary of English
Trojan Horse — The Trojan Horse was part of the Trojan War, as told in Virgil s Latin epic poem The Aeneid . The events of this take place after Homer s Iliad , and before Homer s Odyssey .LegendThis incident is mentioned in the Odyssey :: What a thing was this … Wikipedia
targeted Trojan horse — n. A Trojan horse program sent as an attachment in an e mail message that has a subject line, body text, and return address that have been crafted to fool the recipient into opening the attachment. Also: targeted Trojan, targeted Trojan spoofing … New words
Zeus (trojan horse) — Zbot redirects here. For the action figures, see Zbots. For other uses, see Zeus (disambiguation). Zeus is a Trojan horse that steals banking information by keystroke logging and Form Grabbing. Zeus is spread mainly through drive by downloads and … Wikipedia
AIDS (trojan horse) — AIDS Trojan Common name PC Cyborg Trojan Technical name Aids Info Disk/PC Cyborg Trojan Aliases AIDS!Trojan, Aidsinfo. A trojan, Aidsinfo. B trojan, Cyborg, Trj/AidsInfo. A, Trojan. AidsInfo.a, Trj/AidsInfo. B, Trojan. AidsInfo.b, Trojaids!Trojan … Wikipedia
Trojan War — In Greek mythology, the Trojan War was waged against the city of Troy by the Achaeans after Paris of Troy stole Helen from her husband Menelaus, the king of Sparta. The war is among the most important events in Greek mythology, and was narrated… … Wikipedia
Attack patterns — In computer science, attack patterns are a group of rigorous methods for finding bugs or errors in code related to computer security.Attack patterns are often used for testing purposes and are very important for ensuring that potential… … Wikipedia
Trojan Records — Empresa matriz Sanctuary Records Group Fundación 1968 Fundador(es) Lee Gopthal Género(s) ska rocksteady reggae dub … Wikipedia Español
Trojan Records — infobox record label image bg = #030 parent = Sanctuary Records Group founded = 1968 founder = Lee Gopthal genre = ska rocksteady reggae dub dancehall soul country = United Kingdom url = http://www.trojanrecords.com/Trojan Records is a British… … Wikipedia
denial of service attack — ▪ computer science type of cybercrime in which an Internet site is made unavailable, typically by using multiple computers to repeatedly make requests that tie up the site and prevent it from responding to requests from legitimate users.… … Universalium
denial of service attack — An attack by an intruder that prevents a computer system from providing a service. A denial of service attack will typically involve opening and dropping a large number of TCP/IP connections very quickly so that the target system spends all… … Dictionary of networking