1、Trojan protection - Detecting access to Trojan horses.

2、stratagem of the Trojan horse; Trojan horse

3、pure Trojan group

4、Have you seen Tommy Trojan?

5、motion of Trojan group asteroid

6、Is this gift a Trojan horse?

7、Can you guys say Trojan horse.

8、Trojan Hunter: Protects system from Trojans.

9、But, this method does not apply to Trojan virus certainly.

10、Trojan horse Malware that masquerades as non-malicious software.

11、Protects your phone from harmful viruses and Trojan SMS automatically.

12、Research of Trojan Detection System Based on Artificial Immune

13、1184 BC - Greeks enter Troy using the Trojan Horse (traditional).

14、This paper firstly summarizes some conceptions of Trojan Horse program, and then emphasizes the concealing technology of Trojan Horse program and the familiar methods of concealing technology.

15、She supported welfare reform. If the right regards her as a Trojan horse for left-wing liberalism, the left regards her as a Trojan horse for corporate Clintonism.

16、Methods Analyze the hiding mechanism of new Trojan proceeding from the principle of SPI technique and excogitate a method to check and clean this type of Trojan accordingly.

17、the story of the Trojan War is told in Homer's Iliad.

18、He uses Trojan horses to sneak into people’s computersand infect them, so he can take control.

19、Many computer viruses, worms, and Trojan horses are designed to exploit weak passwords.

20、They are always sending the Trojan horses to many countries in the world.

21、Hastings' Trojan horse-netflix's software, embedded on myriad consumer devices-is already in place.

22、Trojan horse( person or thing used to harm an enemy or opponent,who wrongly believes he is being helped)

23、When users enter their login details in the spoof pages, or in the legitimate pages monitored by the Trojan, this data is entered in a text file which is then sent to the creator of the Trojan.

24、Trojan horses: This self-contained, non-replicating program appears to be benign, but it actually has a hidden malicious purpose. Trojan horses often deliver other attacker tools to systems.

25、A Greek warrior, the attendant and friend of Achilles, who was killed by Hector in the Trojan War.

26、At last the Trojan army wavered and fled, but it stayed firm in front of Skaya Gate.

27、Research is being described as the academic Trojan horse whose personnel have all but captured the city of the intellect.

28、In late 2006, Tencent launched QQ Doctor 1.0, a small anti-Trojan tool to protect QQ user account.

29、Stop thinking, perhaps the sound from the prairie, from the thought riding a Trojan can gallop the child in the world, but also from the past you.

30、To avoid being implanted Trojan, it is best not to open some strange popups or download link to mobile phone payment behavior without the use of public WIFI.