Trojan Horse in TROY Film
The Trojan Horse is a crafty contraption that allowed the Greeks to put an
end to the 10-year-old Trojan War. The wily Greek hero Odysseus conceived
the project and design for the Trojan Horse ; Epeus, is credited with the
actual building of the Trojan Horse.
end to the 10-year-old Trojan War. The wily Greek hero Odysseus conceived
the project and design for the Trojan Horse ; Epeus, is credited with the
actual building of the Trojan Horse.
The Greeks left a giant wooden object made to look like a horse at the Trojan
city gates. Some of the Greeks pretended to sail away, but actually sailed
just out of sight. The other Greeks stood waiting, inside the belly of the
wooden beast.
just out of sight. The other Greeks stood waiting, inside the belly of the
wooden beast.
When the Trojans saw the giant wooden horse and the departing Greek
troops, they thought the wooden horse was a parting gift for the gods, so
most of them wanted to wheel it into their city. The decision to move the
Trojan Horse into the city was opposed by Cassandra, the prophetess whose
fate was never to be believed, and Laocoon, who was destroyed, along with
his two sons, by sea serpents after pleading with his fellow Trojans to leave
the Trojan Horse outside their city walls. The Trojans took this as a sign that
the gods were displeased with Laocoon's message. Besides, the Trojans
preferred to believe that since the Greeks were gone, the long war was over.
The city opened the gates, let the horse in, and celebrated riotously. When
the Trojans passed out or fell asleep, the Greeks climbed down from the belly
of the Trojan Horse, opened the city gates and ushered the rest of the troops
into the city. The Greeks then sacked, destroyed, and burned Troy.
Trojan Horse Virus
Trojan horse sitting invisibly in an infected computer and this program gives full control of that computer.
Trojans do not attempt to inject themselves into other files like a computer virus.
Trojan horses may steal information, or harm their host computer systems.
Trojan horses in this way may require interaction with a hacker to fulfill their purpose, though the hacker does not have to be the individual responsible for distributing the Trojan horse.
It is possible for individual hackers to scan computers on a network using a port scanner in the hope of finding one with a malicious Trojan horse installed, which the hacker can then use to control the target computer.
No comments:
Post a Comment