A Trojan horse, in computing, is a type of malware that appears to be something else, such as a harmless file or program, but is actually a program that allows the attacker to take control of the system.
Trojan horses are typically distributed through email or instant messaging, or are hidden inside other programs that users may download from the Internet. Once installed, the Trojans can allow the attacker to access the victim’s computer remotely, steal information, or damage the computer.
Some of the most common Trojans are Backdoor.Win32.Rbot, which allows the attacker to take control of the system, and …