Trojan Horse definition

Trojan Horse means a destructive computer program that enters onto a computer by pretending to be a simple and safe computer application.
Trojan Horse means code hidden in a legitimate program that when executed performs some unauthorized activity or function.
Trojan Horse means a computer program with an apparent or actual useful function that

Examples of Trojan Horse in a sentence

  • Such software is often called, but is not limited to, a bug, virus, worm, or Trojan Horse.

  • Computer Virus includes but is not limited to 'Trojan Horse' 'worms' and 'time or logic bombs'.

  • Supplier’s information systems shall not contain any virus, malware, Trojan Horse, worm, time bomb, spyware, or other computer programming routine, device or code that could reasonably be anticipated to damage, delete, destroy, replicate, lock, disable, hold hostage, or otherwise detrimentally interfere with, surreptitiously intercept or expropriate any system.

  • Prohibited programs include but are not limited to "Virus," "Trojan Horse," and the like.

  • In the event such access infects DISTRICT’s computer network, system, or device with a virus, Trojan Horse, worm, or any other computer programming routine that is intended to damage, detrimentally interfere with, surreptitiously intercept or expropriate any system data or personal information, CONTRACTOR agrees to indemnify DISTRICT and pay for any and all losses, damages and expenses incurred by DISTRICT to remedy any such infection.


More Definitions of Trojan Horse

Trojan Horse means a destructive computer program that enters onto a computer by
Trojan Horse. “worm”, “drop dead device”, “virus” or other computer software routine intended or designed to:
Trojan Horse means a program in which malicious or harmful code is contained inside apparently harmless programming or data.
Trojan Horse. “virus,” “corruptant,” “worm,” “malware,” “spyware,” or “trackware” (as such terms are commonly understood in the Software industry) or any other code designed, intended to, or that does have any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, any computer, tablet computer, handheld device or other device; or (ii) damaging or destroying any data or file without a user’s consent. Except in compliance in all material respects with the Privacy and Data Security Laws, none of the Company Software (A) sends information of a user to another Person without the user’s consent, (B) records a user’s actions without the user’s knowledge, or (C) employs a user’s Internet connection without the user’s knowledge to gather or transmit information regarding the user or the user’s behavior.
Trojan Horse worm", "drop dead device", "virus" or any other computer software code which is intended or designed to:
Trojan Horse drop dead device" (as these terms are commonly used in the computer software industry), or other software routines designed to permit unauthorized access, to disable or erase software or data or to perform any other similar type of functions and, to the knowledge of the ESI Management, after running a worm and virus check using the procedures described in Schedule 3.8(b)(1) at a date not earlier than Monday, February 17, 1997, the Software does not contain any worm or virus;
Trojan Horse worm", "drop dead device", "virus" (as these terms are commonly used in the computer software industry), or other software routines or hardware components designed to permit unauthorized access, to disable or erase software, hardware or data or to perform any other similar type of functions;