DDoSPedia is a glossary that focuses on network and application security terms with many DDoS-related definitions. It provides a central place for hard to find web-scattered definitions on this topic.
A Trojan Horse (named after that of Greek mythology) is a malicious computer program masquerading itself as useful or otherwise non-malicious. Once executed, Trojan Horses often install a backdoor, allowing for remote access of the infected machine. This allows an attacker to perform various criminal tasks including but not limited to: use of the machine as a zombie within a botnet to perform distributed denial-of-service (DDoS) attacks, data theft, downloading or installing of additional malware, modification or deletion of files, keylogging, watching the user’s screen, crashing the computer, and anonymous internet viewing. It is estimated that Trojan Horses account for 83% of the worlds’ malware infections, with 15% of Trojan Horse-infected machines being members of botnets around the world.
Examples of popular Trojan Horses include: Netbus, Sub7, Y3K Remote Administration Tool, Back Orifice, Beast, Zeus, The Blackhole exploit kit, and Flashback Trojan.