Trojan Horse A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.
Copied from the SANS Glossary of Terms Used in Security and Intrusion Detection. http://www.sans.org/resources/glossary.php Best Erik Kamerling On Wednesday 10 August 2005 18:43, Jason Coombs wrote: > I'll do some more work on this and see where it leads. The proposal of > "backdoor" as the better term just doesn't work, since a backdoor is a > hidden mechanism for gaining entry or control of a system that is built > into the system by its creator or some other involved party. An intruder > may open up a backdoor in a system by altering its programming rather > than by planting a Trojan, so there needs to be a distinction between > the two. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
