Trojan


Also found in: Dictionary, Thesaurus, Medical, Legal, Financial, Encyclopedia, Wikipedia.
Related to Trojan: Trojan War, Durex

Trojan horse

1. Something that initially seems innocuous but is ultimately bad or malicious. A reference to the myth in which Ancient Greek soldiers hid inside a giant wooden horse in order to gain access to the city of Troy. That personable new hire turned out to be a Trojan horse—she stole our intellectual property and sold it to the competitor!
2. A computer program that appears to be useful or harmless but secretly installs malicious code or software onto the infected computer. We have malware on our computer because that game you downloaded turned out to be a Trojan horse.
See also: horse, Trojan

work like a beaver

 and work like a mule; work like a horse; work like a slave
Fig. to work very hard. She has an important deadline coming up, so she's been working like a beaver. You need a vacation. You work like a slave in that kitchen. I'm too old to work like a horse. I'd prefer to relax more.
See also: beaver, like, work

Trojan

work like a beaver

Also, work like a dog or horse or Trojan . Work very energetically and hard, as in She worked like a beaver to clean out all the closets, or I've been working like a dog weeding the garden, or He's very strong and works like a horse. The first of these similes is the oldest, first recorded in 1741; the variants date from the second half of the 1800s. Also see work one's fingers to the bone.
See also: beaver, like, work

a Trojan horse

COMMON If you describe someone or something as a Trojan horse, you mean that they seem good or useful, but are really there to help something be harmed or destroyed in the future. Proposals for a golf course are now seen as a Trojan Horse for hotel and conference centres. This small reduction in the basic tax rate was merely a Trojan horse for the far more drastic cutting of the top rate from 70 to 28 per cent. Note: This refers to an ancient Greek story. The city of Troy was under siege from the Greeks. The Greeks built a large hollow wooden horse and left it secretly as a gift for the Trojans, who took it into the city. However, Greek soldiers were hiding inside the horse, and they were able to cause the destruction of the city.
See also: horse, Trojan

work like a beaver

work steadily and industriously. informal
The beaver is referred to here because of the industriousness with which it constructs the dams necessary for its aquatic dwellings. The image is similarly conjured up by the phrase beaver away meaning ‘work hard’.
See also: beaver, like, work

work like a Trojan

work extremely hard.
1974 Winifred Foley A Child in the Forest She put me to clean out all the fowls' cotes, and I worked at it like a Trojan.
See also: like, Trojan, work

a Trojan horse

1 a person or device intended to undermine an enemy or bring about their downfall. 2 a program designed to breach the security of a computer system, especially by ostensibly functioning as part of a legitimate program, in order to erase, corrupt, or remove data.
In Greek mythology, the Trojan horse was a huge hollow wooden statue of a horse in which Greek soldiers concealed themselves in order secretly to enter and capture the city of Troy, an action which brought the ten-year siege of the city to an end.
See also: horse, Trojan

ˌwork like a ˈdog/ˈslave/ˈTrojan

(informal) work very hard: She worked like a slave to pass her exams. OPPOSITE: not do a stroke (of work)
See also: dog, like, slave, Trojan, work

trojan horse

n. a kind of malicious software that arrives at a personal computer embedded in some other software and then introduces routines that can gather personal information or destroy the operationality of the computer. The consultant called the intruder a “trojan horse” and said I needed yet another program to get rid of it.
See also: horse, Trojan
References in periodicals archive ?
1 shooting defense, the Trojans made nine of their first 11 shots against the No.
The white paper outlines what Trojans are, why they pose a danger to corporate networks, and how to protect against them.
Calyptix Security has ranked the Storm Trojan as having high damage and distribution potential and anticipates a resulting surge in spam and other malicious traffic.
By detecting deviations from typical server and client port usage of all local hosts, traffic limits and internal/external Zone connection, StealthWatch offers the ability to detect the abnormal behaviors that occur after hosts are compromised and are being controlled for whatever cause, including third-generation Trojans.
Trojan is the global leader in the municipal wastewater market.
Trojan Technologies is a Canadian based, high technology environmental company operating internationally.
Utilizing these criteria, Trojan was chosen as the supplier of choice for this project.
This Alamitos Barrier Project reinforces Trojan's position as a leader in the Environmental Contaminant Treatment (ECT) market," said Marvin DeVries, Executive Vice-President Trojan Technologies.
By receiving the first certifications for Class A UV water treatment systems, Trojan has set a high standard for the rest of the water treatment industry," said Mark Jost, Vice President of NSF Certification.
Bulckaert brings to Trojan experience in managing global operations in a manufacturing and high-tech competitive environment.
Trojan Technologies believes that the industrial and commercial market for UV disinfection equipment offers Trojan the potential for significant growth.
The contract, valued at approximately C$1 million, includes a total of four Trojan UVSwift(TM) units designed to treat up to 21 million gallons or 79,500 cubic metres per day of drinking water.
And for Allan Fine, whose Trojan T-shirt never saw a losing game, there's nothing better than a win over No.