Trojan horse (computing) facts for kids
A Trojan horse (often just called a Trojan) is a type of computer program that looks harmless but actually has a hidden, harmful purpose. It's a tricky kind of malware, which means software designed to damage or disable computers. A Trojan pretends to do one thing, like being a game or a useful tool, but secretly it does something else, such as letting someone else control your computer or steal your information. Sometimes you might notice it, but often you won't.
Trojans are usually spread by tricking people. For example, you might click on a bad pop-up ad, open a strange email attachment, or download a fake update for your computer. Once a Trojan is on your computer, it can act like a "backdoor," allowing an unauthorized person to get into your computer without you knowing. They might be able to see or change your files, or even steal private details like your banking information or passwords. Trojans can also spread to other devices connected to your computer's network.
It's rare to get a Trojan just by visiting a website. Most of the time, Trojans come hidden inside things you download, like music, wallpapers, games, or other programs (apps).
What is a Trojan Horse?
A Trojan horse is a type of malware that tricks you into installing it. It looks like a normal, helpful, or fun program. But once it's on your computer, it secretly carries out harmful actions. It might steal your data, delete files, or even let a hacker take control of your computer.
How Trojans Spread
Trojans often spread through clever tricks. They might be hidden in:
- Fake pop-up messages that tell you to update something.
- Emails with attachments that look important but are dangerous.
- Messages or links on social media.
- Advertisements that lead to harmful websites.
- Fake updates for your computer's software or drivers.
When you click on these, the Trojan can sneak onto your computer.
What Trojans Can Do
Once a Trojan is on your computer, it can do many harmful things:
- Steal Information: It can look for and send your personal details, like passwords, bank account numbers, or other private data, to a hacker.
- Create a Backdoor: This means it opens a secret way for a hacker to get into your computer whenever they want.
- Control Your Computer: A hacker might be able to use your computer to send spam, attack other computers, or do other bad things, all without you knowing.
- Delete or Change Files: Some Trojans can damage your files, making them unusable or changing them without your permission.
- Spy on You: Programs like spyware can act as Trojans, watching what you do on your computer and sending that information to someone else.
The Name's Origin
The name "Trojan horse" comes from an old story in Greek mythology. In this story, the Greeks were fighting the city of Troy. They built a giant wooden horse and left it outside the city walls, pretending it was a gift. The people of Troy brought the horse inside their city. But inside the horse were Greek soldiers! Once the horse was inside Troy, the soldiers came out and helped defeat the city. Just like the wooden horse, a computer Trojan looks harmless but hides something dangerous inside.
See also
In Spanish: Troyano (informática) para niños