Agamemnon sacrifices his eldest daughter, Iphigenia, to the gods for victory in the Trojan War.
FORBES: Founders Syndrome: The Third Rail of the Startup world
His office is not far from the old Trojan nuclear plant, closed in 1992.
Number 2: Social media will simply bring viruses and Trojan horses into your network.
Like any Trojan Horse strategy, this is a long shot, but it must be tried.
Today, such backdoor malware codes are edging ahead of Trojan spyware in terms of sheer numbers.
FORBES: Worm Attacks Coming For Google's Android - Kaspersky Lab
This led to the virus used by the gang being dubbed the "Storm Trojan".
Troj.mdk Trojan had been found in more than 7, 000 apps downloaded from non-Google-owned stores.
It may or may not have noticed the Trojan horse in its midst.
Israel, too, has had its share of such cyberspying, stemming from a case dubbed the Trojan Affair.
It follows the Flashback trojan attack which security experts believe infected up to half a million Macs.
The devices had been infected by a Trojan-based attack first discovered in 2011, news agency Xinhua reported.
Its CEO says he hopes that the rides are a Trojan horse for greater understanding about robot technology.
But probably the most inexpensive full-blown solution comes from Moosoft, which specializes in solutions to Trojan horse programs.
The latest attack is a so-called Trojan horse, code used to swipe information from compromised PCs, named Myfip.
Crooks have developed a new Mac OS X-specific Trojan that mimics the behaviour of a legitimate software installer.
Microsoft's other attempts to put a Trojan horse in your living room, WebTV and UltimateTV, were dismal failures.
PS3 as a Trojan horse, Blu-ray has instead hobbled it by increasing its price and delaying its introduction.
ECONOMIST: Can the PlayStation 3 revive the ailing electronics giant?
"It's a Trojan horse way of signing up new accounts, " says Philip Wensley, a Morgan Stanley analyst in Sydney.
Last year, a British nurse was blackmailed by hackers who had used a Trojan to access her personal e-mails.
Several versions instructed infected computers across myriad time zones to download a Trojan at the same single, synchronized moment.
Schrader said the best defense against Trojan Horse e-mail viruses is end-user education -- and, of course, updated virus-scanning software.
"It is much easier to get a remote access Trojan into a company than break down a firewall, " Viveros said.
Among its other discoveries, in 2011 Wise spotted in a "Trojan" asteroid ahead of the Earth in its orbit.
BBC: Supermassive black holes and hot galaxies in giant haul
The ring allegedly used a "malware" program called "Zeus Trojan" to hijack accounts, embedding it in email messages and attachments.
In the early days of asteroid-naming, characters from western classical history were preferred goddesses, warriors from the Trojan war and so on.
Eric Bana, as the Trojan Hector, is slower as a fighter, more dogged and earth-bound, but he makes a fine reluctant warrior.
Android has been the favorite of malicious code writers since August 2010, when the first Trojan program targeting the OS was detected.
Flame, a backdoor Windows trojan, doesn't just sniff and steal nearby network traffic info -- it uses your computer's hardware against you.
ENGADGET: Flame malware snoops on PCs across the Middle East, makes Stuxnet look small-time
But this latest Trojan warning inflames worries over unlicensed third-party app stores - and the poor awareness among users over possible threats.
Mr Armitage has penned a version of Homer's second epic which deals with the long-delayed homecoming of Odysseus from the Trojan wars.
应用推荐