What Was The Trojan Horse? (Question)

Trojan horse, huge hollow wooden horse constructed by the Greeks to gain entrance into Troy during the Trojan War. The horse was built by Epeius, a master carpenter and pugilist. Despite the warnings of Laocoön and Cassandra, the horse was taken inside the city gates.


  • The Trojan Horse refers to a wooden horse said to have been used by the Greeks, during the Trojan War, to enter the city of Troy and win the war. There is no Trojan Horse in Homer’s Iliad, with the poem ending before the war is concluded.

What was the Trojan horse and how was it used?

After besieging the walls of Troy for ten years, the Greeks built a huge, hollow wooden horse, secretly filled it with armed warriors, and presented it to the Trojans as a gift for the goddess Athena, and the Trojans took the horse inside the city’s walls.

What was the story of the Trojan Horse?

The story of the Trojan Horse is well-known. First mentioned in the Odyssey, it describes how Greek soldiers were able to take the city of Troy after a fruitless ten-year siege by hiding in a giant horse supposedly left as an offering to the goddess Athena.

Was the Trojan Horse a real thing?

Turns out the epic wooden horse that gave the Greeks their victory was all a myth. Actually, historians are pretty much unanimous: the Trojan Horse was just a myth, but Troy was certainly a real place.

What did the Trojans think the horse was?

The Trojans believed the huge wooden horse was a peace offering to their gods and thus a symbol of their victory after a long siege. They pulled the giant wooden horse into the middle of the city. They didn’t realize that the Greeks had hidden a select group of soldiers inside the horse.

Why is it called a Trojan horse?

In computing, a Trojan horse is any malware that misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.

Was Helen of Troy a real person?

There are many conflicting elements to the mythology that surround the figure of Helen, some interpretations of the myth even suggest that she was abducted by Paris. But ultimately, there was no real Helen in Ancient Greece, she is purely a mythological character.

Why did the Trojan Horse work?

The horse was built by Epeius, a master carpenter and pugilist. The Greeks, pretending to desert the war, sailed to the nearby island of Tenedos, leaving behind Sinon, who persuaded the Trojans that the horse was an offering to Athena (goddess of war) that would make Troy impregnable.

Did Archaeologists find the Trojan Horse?

Archaeologists claim they have found what they believe are pieces of the Trojan Horse. According to a report by the Greek news site Naftika Chronika, the researchers excavating the site of the historical city of Troy on the hills of Hisarlik have unearthed a large wooden structure.

Who Killed Achilles?

According to legend, the Trojan prince Paris killed Achilles by shooting him in the heel with an arrow. Paris was avenging his brother, Hector, whom Achilles had slain. Though the death of Achilles is not described in the Iliad, his funeral is mentioned in Homer’s Odyssey.

Did Achilles exist?

The consensus of Historians and scholars seems to be that Achilles was a legend. His humanity was not literal but rather literary. Homer’s skill created a character that encompassed both the heroism and the failings of the warriors who held Troy’s walls against a siege.

What city is Troy now?

The ancient city of Troy was located along the northwest coast of Asia Minor, in what is now Turkey. It occupied a strategic position on the Dardanelles, a narrow water channel that connects the Aegean Sea to the Black Sea, via the Sea of Marmara.

Was the Trojan Horse destroyed?

There is no Trojan Horse in Homer’s Iliad, with the poem ending before the war is concluded. That night the Greek force crept out of the horse and opened the gates for the rest of the Greek army, which had sailed back under cover of night. The Greeks entered and destroyed the city of Troy, ending the war.

Was the battle of Troy real?

Was the Trojan War real? There has been much debate over historical evidence of the Trojan War. Archaeological finds in Turkey suggest that the city of Troy did exist but that a conflict on the immense scale of a 10-year siege may not have actually occurred.

Who came up with Trojan horse idea?

The Trojan War had been going on for a decade, with no end in sight and many Greek heroes dying, when Odysseus came up with an idea that won the war for the Greeks. Because the Trojans considered horses to be sacred, the Greeks built a large, hollow wooden horse.

What Is a Trojan Horse?


Have You Ever Wondered.

  • What is a Trojan horse and how does it work? Identify which epic poetry contains the narrative of The Trojan Horse. What may the appearance of a modern-day Trojan horse be like

When we look at today’s Wonder of the Day, we are transported back in time to the time of the Trojan War. In Virgil’sAeneid, a famous epic poem, it is stated that the Greeks attempted to seize the ancient city of Troy and theTrojanpeople who had lived there for more than ten centuries. They were finally successful as a result of a creative bit of ruse. It was under Odysseus’ instruction that the Greeks created the enormous wood horses that served as symbols of Troy and stationed them at the city’s entrance gates for the rest of their lives.

  • A big wooden horse, according to the Trojans, was a peace sacrifice to their gods and, as such, a sign of their victory following a longsiege They dragged the massive wooden horse through the streets of the city center.
  • That night, when the Trojans had retired to their beds, the Greek troops trapped within the horse were able to break free and unlock the city’s gates, allowing the remainder of the Greek army to enter, which had returned under cover of darkness from its nighttime voyage.
  • The word “Trojanhorse” is still in use today “Even today, the phrase “deception” or “trick” refers to any type of deception or trick that includes convincing a target to allow an adversary to enter a secure location.
  • In this way, they are able to persuade people to install and use them without them recognizing the danger they are putting themselves in.

Wonder What’s Next?

Even an apple a day won’t keep tomorrow’s Wonder of the Day away!

Try It Out

Would you fall for the traditional Trojan horse ruse if it was presented to you today? Maybe not.especially if you were accompanied by a group of supportive friends and family members! Gather a group of people to assist you in participating in one or more of the following activities:

  • Do you enjoy reading about the mythology of ancient Greece? It’s incredible how much of today’s popular culture, including old sayings, can be traced back to these ancient tales. Today, go online and have a good time going through various articles. Some Outstanding Greek Myths! Which ones are your personal favorites? Why? What old sayings or present pop culture allusions have you heard that have their roots in an ancient Greek myth? Can you name any? Would a Trojan horse still be effective today? What are your thoughts? Wouldn’t you feel a little skeptical if a gigantic wooden horse showed up on your porch and demanded your attention? Probably! The question is, what kind of present would you be most likely to accept? What if you opened your door and discovered.what? Are you talking about a video game console? Is it time for a new cell phone? How about a life-size replica of your favorite music star? Was there anything you needed to do in order to open your arms and welcome it into your home? Of course, such products would not be able to support an army. But who knows what they may be hiding. Is it some sort of listening device? Is there a concealed video camera here? Is it possible that a super-secret brain scanner from the future exists? Yikes! Consider what a Trojan horse may look like in today’s world and create a short tale to describe how it might function in our world. As soon as you’re finished, upload your tale to Facebook so that all of your Wonder Friends may enjoy it. We can’t wait to see what kind of ideas you come up with. Do you want to take on a challenge? To assist children of all ages in learning about cyber security, the National Science Center (NSC) has developed an entertaining game that teaches them how to spot malware and avoid being a victim of computer “trojan horses.” Do you go on the internet, send emails, or use a cell phone? Then, using NSC Cyber Security methods, you can learn how to keep safe. Put your skills to the test against the Cyber Swarm! Defenders can be used to halt them dead in their tracks! When it comes to interfering with cyber security, these people aren’t fooling around. Learn how to beat them at their own game by understanding their strategy.


Become a member of Wonderopolis and get the Wonder of the Day® through email or text message every day.

Join the Buzz

Don’t forget to take advantage of our unique offers, freebies, and promotions. Be the first to know when something new happens!

Inside The True Story Behind The Legendary Trojan Horse

Photograph by Adam Jones / Wikimedia Commons In Turkey’s Dardanelles, there is a facsimile of the Trojan Horse. Ancient Greek legend has it that it was the Trojan horse that enabled the war-weary Greeks to eventually invade the city of Troy and claim victory in the Trojan War. In accordance with legend, the horse was erected at Odysseus’s request and he then concealed himself within its framework with several other warriors in order to eventually lay siege to the city of Troy. Its architecture — as well as its function — was so monumental that it was immortalized in classical masterpieces for all time.

Historical scholars have recently questioned if the over-the-top exhibition of Grecian military strength was nothing more than a fiction, created to make the Greek army appear more like a heavenly force and less like the simple mortals that they actually were.

Irrespective of whether or not the Trojan horse actually existed, its significance in history cannot be overstated.

The Trojan Horse in theAeneid

When the Trojan horse appears in antiquity, it’s in Virgil’s epic poem The Aeneid, written in 29 B.C. by a Roman poet from the Augustan era, who was inspired by the story of Achilles and his horse. According to Virgil’s version of the story, a Greek soldier by the name of Sinon tricked the Trojans into believing that he had been abandoned by his men and that the Greeks had returned home. However, he claimed that one of his troops had left behind a horse as a homage to the Greek goddess Athena.

The Trojan priest Laocoön, on the other hand, soon sensed that something was awry.

Sadly, it was too late — “the horse had already reached Troy,” and thus was created the legend of the Trojan horse.

It is said that they should “pull the statue to her dwelling” and “give prayers to the goddess’s divinity.” We were successful in breaching the wall and allowing the city’s defenses to be penetrated.

An Early Skeptic Of The Trojan Horse Story

A drama by Euripides called The Trojan Women, which was written before the Aeneid, also makes allusion to a “Trojan horse.” Throughout the play, which was initially composed in 415 B.C., Poseidon (the Greek deity of the sea) addresses the audience as the play opens. For from his home beneath Parnassus, Phocian Epeus, assisted by Pallas’ craft, framed a horse to bear within its womb an armed host, and sent it within the battlements, fraught with death; wherefrom in days to come men will tell of “the wooden horse,” with its hidden load of warriors, said Poseidon in the opening scene.

Even though the wooden horse was appropriately represented in The Trojan Womenplay as a metaphor, the Aeneid’s representation caused historians to believe that the wooden horse was more literal, as well as really existing in the real world.

Pausanias, a Greek explorer and geographer who lived in the second century A.D.

Pausanias depicts a horse made of metal, rather than wood, that was used to transport Greek warriors in his book,Description of Greece.

But tradition has it that the horse was ridden by one of the most heroic of the Greeks, and the design of the bronze figure corresponds to this account rather well.” Menestheus and Teucer may be seen peering out of the opening, as well as the sons of Theseus.

Historians Think The Trojan Horse May Have Been A Metaphor — Or Siege Engine

Commons image courtesy of Wikimedia Commons Trojans are seen celebrating as the horse is driven into town in this image from 2004’s Troy. Image from the film Troy. Dr. Armand D’Angour of the University of Oxford clarified the situation more recently, in 2014. In the University’s newsletter, he said that “archaeological evidence suggests that Troy was certainly burned down; but, the wooden horse is an imaginative myth, presumably inspired by the way ancient siege-engines were coated with wet horse-hides to prevent them from being set alight.” However, as recently as August 2021, researchers in Turkey discovered dozens of wooden planks going back thousands of years in the hills of Hisarlik — which is widely thought to be the historical location of the city of Troy — which they claim to represent the site of the ancient metropolis.

  • The archaeologists were pretty confident they had discovered the remnants of the very genuine Trojan Horse itself, despite the fact that many historians expressed skepticism.
  • Regardless of whose version of the narrative you choose to believe, the phrase “Trojan horse” is still in common usage today.
  • The term “Trojan horse” — more generally referred to as merelya trojan— is now more widely employed in the context of computer malware that deceives users about the real nature of the infection.
  • Perhaps, in the same manner that we regard Virgil and Pausanias now, historians of the future will regard computer scientist Ken Thompson, who initially invented the phrase in the 1980s.
  • ‘Perhaps it’s more necessary to put your faith in the individuals who built the program,’ he suggests.
  • Followed by a story of an old Greek jar that was used to curse more than 55 persons in Athens, Greece.

Did the Trojan Horse exist? Classicist tests Greek ‘myths’

We are all familiar with the story of the Trojan Horse. First stated in Homer’s Odyssey, the Trojan Horse relates how Greek troops were able to capture the city of Troy after a failed ten-year siege by hiding in a gigantic horse that had been left as a sacrifice to the goddess Athena by the Trojans. Was it, however, a fabrication? Archaeological evidence reveals that Troy was definitely burned down; but, the wooden horse is an imaginary myth, presumably inspired by the way ancient siege-engines were coated with damp horse-hides to prevent them from being set ablaze, according to Oxford University classicist Dr Armand D’Angour.

  • The Iliad and Odyssey, which are known as Homer’s epics, were created orally, without the use of written manuscripts, somewhere in the 8th Century BC, according to Dr D’Angour, following a long history of oral minstrelsy that had existed for years before that time.
  • Even though the poems were produced without writing and verbally conveyed, we can be certain that they were eventually written down in Greek because that is the only way they have survived.’ According to Dr.
  • The story has been read by millions of people and is among the most shared on the BBC website over the previous few days.
  • D’Angour is working on a two-year project to restore the sounds of Greek music and to determine the importance of these sounds in some of the most renowned poetry from Ancient Greece.
  • It was poets who produced the Iliad and Odyssey, as well as the love poems of archaic Lesbos, the victory odes of the early fifth century BC, and the choral sections of Greek tragedy and comedy, who composed the words that were to be sung and accompanied by musical instruments.
See also:  What Horse Tracks Are Racing Today? (Solved)

The melodic structures of ancient Greek music are given even less attention, in spite of the fact that we now have enough fragments and voluminous writings by ancient authors and musical theorists (all of which have been admirably translated and compiled by Andrew Barker in Greek Musical Writings) to exercise an informed scholarly imagination on them.

It is inevitable that readers of ancient writings will lose part of the original artistic effect of these songs if they do not pay attention to the auditory dimension of them.

The Trojan Horse: When True Intents Are Concealed

A Trojan Horse is a container with a harmless appearance that is used to conceal anything in order to get past defenses or some other impediment. Trojan Horses are capable of serving both good and evil purposes. Here’s how to identify and make advantage of them. ***

The Basics

The story of the Trojan Horse is one of the most well-known of all the Greek myths, and with good reason. The Trojan Battle had been raging for a decade with no sign of a conclusion in sight and many Greek heroes having died when Odysseus came up with an idea that helped the Greeks win the war. Because the Trojans regarded horses as holy, the Greeks constructed a massive, hollow wooden horse in their honor. They built it out of wood from Cornel trees, which are also considered sacred, in order to make it even more appealing.

  1. After considerable deliberation about whether or not the Greeks could be trusted, the Trojans hauled the massive horse within the city’s gates.
  2. By midnight, everyone had fallen into a drunken coma.
  3. The Greeks gained entry to the city at that point.
  4. It is believed that some of the troops proceeded deeper into the countryside, establishing villages that eventually contributed to the establishment of Rome.
  5. Although there is some archeological evidence for the existence of Troy, most historians now believe that the narrative is a fable created by Greek mythology.
  6. Whether it is a myth or not, the fact that the narrative of the Trojan Horse has endured for more than 3,000 years demonstrates its strength and usefulness as a fundamental metaphor.
  7. We can only hypothesize as to why this is happening.
  8. Moreover, it serves as a fable, a metaphor, a challenge to be inventive, and an example of thinking beyond the box.

It is both useful and weird at the same time. Because it serves as a conceptual model, we may adapt the Trojan Horse myth to a wide range of disciplines and circumstances. It is a notion that may be utilized for both positive and bad purposes.

The Trojan Horse in Marketing and Business

We live in an era in which we are constantly bombarded with commercial messages at all hours of the day. We have learned to block out these messages, just as the Trojans did while they were hidden in their city – we use advertisement blockers, toss away junk mail that hasn’t been opened, ignore billboards, and filter out spam emails. Marketers frequently employ a method similar to that of the Trojan Horse in order to attract our attention. The apparent gift they are offering is an ebook, a discount card, a sample, or something similar.

  1. When things appear to be too good to be true, it is a good heuristic to simply forget about them.
  2. The Greeks used a holy creature and a specific sort of wood to create a shape that would appeal to their intended audience.
  3. The Greeks demonstrated inventive thinking by devising a method that was novel and, as a result, surprising.
  4. Once a marketing tactic becomes well-known, its effectiveness begins to diminish.
  5. Fortunately, these ruses are now widely known, and we just disregard them.
  6. The following are some examples of Trojan Horse marketing:
  • Allowing readers to read the first chapter of a book for free if they sign up for an email list – People who have read the chapter and gotten more emails from the author are more likely to purchase the whole book than they would have done if they had simply seen an advertisement. It is possible to create free, high-quality blog content for an audience to enjoy – Once people are interested in the blogger’s voice and skills, it is possible to begin promoting. Many individuals will wish to assist the individual whose work they have been consuming for free at some time in the future. This support might take the form of purchasing courses, books, or consulting services, or it could take the form of a donation to a Patreon page. We created themembership not just as a collection of extras for individuals, but also as a way to raise funds to sustain the free material we give. Writing a book detailing an expert’s particular expertise – While book sales are not always strong, having the book published helps the expert’s firm succeed. To give an example, Ryan Holiday has indicated that his books have resulted in his earning more money from speaking and consulting than he has earned from book sales. A business’s ability to generate the greatest amount of income from revenue streams that do not appear to be its primary goal — for example, high-fashion brands often make more money from perfume than from clothing, cinemas rely on the sale of popcorn and drinks, and some restaurants make the majority of their money from the sale of alcohol Creating viral branded content that people want to share and participate with because it is entertaining and frequently humorous — For example, try watching the Android “Friends Furever” video without sending it to at least one other person. The endearing video brings a marketing message to a close, increasing the likelihood that people will pay attention to it.

Seth Godin explores the concept of permission marketing under a different term in his bookPermission Marketing. When you allow others to access your mailbox, you are allowing them to access your city. It’s difficult to predict whether they’ll be there for good or bad reasons in advance. Godin describes how the notion works in a blog post, which is available here: Marketing by permission (rather than by right) is the privilege (rather than the right) of providing expected, personal, and relevant communications to those who have shown an interest in receiving them.

  • It understands that treating people with dignity is the most effective method to get their attention.
  • Real permission works in this way: if you cease showing up, people grumble and inquire as to where you have disappeared to.
  • First impressions are important, but you should not ask for the sale right away.
  • You must first make a pledge in order to obtain authorization.
  • And then, and this is the difficult part, all you have to do is wait.
  • You are neither selling or renting the list, nor are you demanding greater attention.
  • According to the evidence, Amazon is developing a permission asset rather than a brand asset.
  • Once individuals fell for the original Trojan Horse, Amazon enticed them with more things and progressively grew its share of their online spending by offering them more and more.
  • Amazon has invested millions of dollars in technology and infrastructure, in the same way that the Greeks put out effort to construct the horse.

According to John Warrillow, writing on the subject of Amazon Prime, “Like many subscription models, Amazon Prime is a Trojan horse that is expanding the list of products consumers are willing to buy from Amazon while also providing the eggheads in Seattle with a mountain of customer data to sift through.”

The Trojan Horse and the Benjamin Franklin Effect

Let’s imagine there is someone who strongly dislikes you – and I mean strongly. It’s not a big deal; this occurs to everyone. The question arises, though, if you are required to create a bond with this individual. Or it’s possible that they don’t detest you at all, they simply don’t know who you are. Either way, you need to create a relationship with them. What should you do? Invite them out for coffee, give them a present, or ask a friend to introduce you through email. One alternative is to take use of the Benjamin Franklin effect, which is effectively a Trojan Horse technique to developing interpersonal ties.

  • To put it another way, the original favor serves as the Trojan Horse, concealing a connection within it.
  • He agreed, and I was delighted.
  • When we next met in the House, he spoke to me (something he had never done before), and with great courtesy; and he ever after displayed a readiness to assist me on all occasions, so that we became great friends, and our friendship remained to his death.
  • Asking someone for a favor suggests that we already appreciate them and think them to have something we lack — a type of flattery which acts as the gift.
  • Examples of the conjunction between the Benjamin Franklin effect and the Trojan Horse include:
  • The foot-in-the-door approach is employed by salespeople. When someone approaches you with a minor request (for example, filling out a survey), they will attempt to sell you something. Try contacting or emailing someone you know who is knowledgeable in a certain field (rather than Googling it) whenever you have a question that is connected to their expertise. One Reddit member on the subreddit r/LifeProTips advocates texting your mother basic questions on a daily basis to help build the bond between you two. Individuals will see this as an indication that we regard them as knowledgeable, increasing their likelihood of responding to greater demands.

In his book The 48 Laws of Power, Robert Greene also suggests a variety of Trojan Horse–style strategies, which include disguising genuine intentions behind a veneer and adopting particular behavior to achieve objectives. To disarm, selective honesty and judgment should be used. A single real and honest move will outweigh dozens of dishonest ones in the long run. Even the most cynical individuals are taken aback by genuine acts of honesty and charity that are given from the heart. Once you’ve pierced their armor with your selective honesty, you’ll be able to lie and control them as you choose.

With the same analogy in mind, Greene returns to it in The 33 Strategies of War: make friends with your adversaries by worming your way into their hearts and thoughts.

The guard will be accompanied by a companion.

The Trojan Horse technique, which involves performing an unexpected act of compassion and giving that causes individuals to relax their defenses, can have a more immediate impact.

Knowing the source of the problem provides you tremendous ability to transform it from the inside out. You must constantly keep in mind that your primary priority is to penetrate the center. It is never acceptable to whale away at the perimeter or just pound on the walls.

How Artists Change Your Mind

Many artists (a word used here to refer to anybody who makes anything, rather than simply those who paint canvases) have utilized their work to conceal key political goals or to promote social causes. Political and social issues are conveyed via beautiful music by artists such as the Beatles, Bob Dylan, and Conor Oberst. Key life lessons and paradigm-shifting concepts are encapsulated in amusing tales and analogies by bloggers such as Seth Godin and James Altucher, among others. The ladies who worked on the Bayeux Tapestry brought their own unique perspectives to the vistas of conflict and victory shown on the tapestry.

  1. The most tranquil paintings of Johannes Vermeer reveal intricate, forbidden storylines that are difficult to understand.
  2. Consider the character of Gatsby, who throws opulent parties only for the aim of luring Daisy back to him.
  3. People express themselves by whatever techniques are available to them in order to communicate their opinions and attitudes.
  4. The goal is to communicate a message in a way that is understandable to the general public.
  5. However, when it is presented in an entertaining manner, we are delighted to draw the wooden horse within the city walls.
  6. Now is the time for artists to employ their ingenuity and imagination to disseminate their thoughts.
  7. Considering art as a Trojan Horse is a really crucial notion to grasp.

This organization’s mission is to raise awareness about the value of clear thinking, lifelong learning, making sound decisions, and having a meaningful life.

A large number of individuals have been reached and motivated by this agenda as a result of the use of tales, analogies, and rigorous investigation of essential themes.

A lot more than that, it’s about changing the way individuals think about themselves.

However, much like in the legendary tale of the Trojan Horse, tales serve as vehicles for the transmission of information such as morals and lessons.

In order to do this, we must create our own Trojan horses by embedding our goods and ideas into tales that people want to tell.

Art is approached in the same way by Francis T.

As opposed to one one manifestation, the Trojan Horse offers numerous platoons, each capable of strategically addressing the broader culture while simultaneously demonstrating reproducible answers.

In summary, when it comes to spreading a concept or sparking change, we would do well to take a page from the ancient Greeks’ book of instructions.

We may transmit meaning to others by presenting it in a manner that is appealing to them.

Artists, marketers, and politicians (among others) have long recognized the necessity of taking a creative approach to problem solving. It is a method of infusing our ideals, both good and negative, into the lives of others through the presentation of a seemingly innocuous gift.

Trojan War

From Homer and Herodotus to Sophocles and Virgil, the account of the Trojan War—the Bronze Age struggle between the kingdoms of Troy and Mycenaean Greece—crosses the boundaries of history and legend in ancient Greece, and it has inspired some of the finest authors of antiquity, including Virgil. After re-discovering the site of Troy in what is now western Turkey in the 19th century, archaeologists have unearthed more and more evidence of a kingdom that reached its zenith and may have been destroyed around 1,180 B.C.—perhaps serving as a model for the tales recounted by Homer some 400 years later in his epic poems the “Iliad” and the “Odyssey.”

See also:  What Is Horse Liniment? (Best solution)

The Narrative of the Trojan War

It was the abduction (or elopement), according to ancient traditions, of Queen Helen of Sparta by the Trojan prince Paris that triggered the outbreak of battle. Her betrayed husband Menelaus persuaded his brother Agamemnon, the king of Mycenae, to launch an expedition to reclaim Helen from exile in Spartia. Among those who followed Agamemnon on his expedition were the Greek heroes Achilles, Odysseus, Nestor, and Ajax, as well as an army of more than a thousand ships from all across the Hellenic world.

  1. After more than a decade of fights and skirmishes, including the legendary deaths of the Trojan prince Hector and the supposedly invincible Achilles, the Greek soldiers finally withdrew from their camp, leaving a massive wooden horse outside the city’s gates.
  2. When night fell, the horse’s mouth opened and a party of Greek warriors, headed by Odysseus, crawled out and sacked the city of Troy from the inside out.
  3. Odysseus’ long and sometimes interrupted journey home to Ithaca, as recorded in Homer’s “Odyssey,” took him a total of ten years.
  4. Following his death, some reports claim she was deported to the Greek island of Rhodes, where she was executed by hanging by a spiteful war widow.

The Trojan War Epics

There is very little information available regarding the historical Homer. Historians believe that the “Iliad” was completed about 750 B.C., and that the “Odyssey” was completed around 725 B.C. Both have their origins in the oral tradition and were first recorded decades or centuries after they were written, respectively. Many of the most well-known episodes of the war, from the abduction of Helen to the Trojan Horse and the sack of Troy, can be traced back to the so-called “Epic Cycle,” a collection of narratives compiled in the sixth century B.C.

The “Aeneid,” the third major classical epic inspired by the Trojan War, was written in the first century B.C.

It tells the story of a group of Trojans headed by the hero Aeneas who flee their ruined homeland and go to Carthage before settling in Rome and creating the city.

It was part of Virgil’s goal to tell the narrative of Rome’s first imperial dynasty in a way that was equally as magnificent as the Greeks’.

Is the Trojan War a Real War?

Many passages of Homer’s epic of the Trojan War are difficult to comprehend historically. Helen was fathered by Zeus, who disguised himself as a swan and raped her mother Leda), and much of the action is led (or interfered with) by the many rival Greek gods. For example, according to legend, Paris won Helen’s heart after bestowing the golden apple upon the goddess Aphrodite in recognition of her beauty (“The Judgment of Paris” tells the story of how Paris was asked to choose the most beautiful goddess among Hera, Athena, and Aphrodite by bestowing the apple upon the winner).

  1. In 1870, under the guidance of German archaeologist Heinrich Schliemann, extensive excavations at the site of Troy uncovered a tiny citadel mound and layers of rubble that were 25 meters thick.
  2. until its eventual abandonment in A.D.
  3. Following recent digs, it was discovered that Troy had an occupied area ten times the size of the citadel, establishing it as a large Bronze Age metropolis.
  4. At the time of Homer’s writing, 400 years later, the ruins would still have been evident.

Definition of TROJAN HORSE

first and foremost, someone or anything that is designed to undermine or subvert from inside, generally by deception 2: a computer program that appears to be beneficial but includes hidden instructions that, when executed, cause an unlawful or harmful activity to be carried out (such as destroying data files) additionally:the instructions of a software with hidden instructions—compare virussense 3

Did you know?

After 10 years of siege, the Greeks constructed a massive, hollow wooden horse and covertly filled it with armed troops, which they offered to the Trojans as a gift for the goddess Athena. The Trojans subsequently transported the horse within the city’s walls. This was the night when the armed Greeks rushed out of the city and conquered and burnt it. Thus, a Trojan horse is defined as anything that appears benign on the surface but that, if accepted, has the ability to injure or destroy—for example, a computer application that appears to be beneficial but ends up ruining or destroying the computer’s operating system.

Examples ofTrojan horsein a Sentence

It’s possible that they’re utilizing the other firm as a Trojan horse.

First Known Use ofTrojan horse

1837, in the sense that has been defined atsense 1

History and Etymology forTrojan horse

From the enormous hollow wooden horse, which was loaded with Greek warriors and smuggled behind the gates of Troy by a stratagem, to the smaller hollow wooden horse

Learn More AboutTrojan horse

This entry was cited as “Trojan horse.” This entry was posted in Merriam-Webster.com Dictionary on February 24, 2022 by Merriam-Webster.

Was the Trojan Horse a true story?

  • 10:17 a.m. ET on June 9, 2021
  • Updated at 9:37 a.m. ET on June 11, 2021

The legendary Greeks, as well as a massive wooden horse, play a role in one of the most renowned legends in the history of the world. Many people have grown familiar with these stories as a result of the works of such films as Gladiator, despite the fact that so many of them seem too fantastic to be true. 4 For thousands of years, people have been telling the story of the Trojan horse. Unfortunately, many historians, if not all of them, have come to the conclusion that the Trojan horse myth was not accurate.

  1. Of fact, the present was nothing more than a ploy, since it included a group of Greek troops who were trying to get into the country.
  2. 4 The story has become so well-known that the name “Trojan horse” has been coined to refer to it.
  3. They also came to the conclusion that there was, in fact, a conflict between the Greeks and the inhabitants of Troy.
  4. 4 It is possible that the narrative of the Trojan horse has been exaggerated rather than completely manufactured.
  5. The possibility that an earthquake or a Greek machine provided the opportunity for the Greeks to breach Troy’s fortifications has been speculated upon by historians.
  6. 4 Because of the story’s widespread popularity, several recreations of the legendary horse have been produced.
  7. An archaeologist from Germany found it and took a large amount of jewelry from the site, which he later gave to his wife as a wedding gift.

Most read in the greek islands

Further archaeological excavations revealed that the city of Troy was far larger than previously assumed. This was a significant discovery. They also discovered around 10 separate levels, indicating that the city had been taken at least twice before this discovery. Although the narrative of the Trojan War may not have included a big horse because of the numerous attacks, it was unquestionably a historical event.

An Explanation of the Term “Trojan Horse”

The Trojan Horse is a cunning contrivance that allowed the Greeks to bring the 10-year-old Trojan War to a close with relative ease. The notion and design for the Trojan Horse were created by the cunning Greek hero Odysseus; nevertheless, it is Epeus who is credited with the actual construction of the Trojan Horse. The Greeks left a massive wooden item in the shape of a horse at the entrance to the Trojan city gates. Greeks claimed to sail away but in reality just went a short distance away from the ship’s location.

  • After seeing the enormous wooden horse and the departing Greek forces, the Trojans believed the wooden horse was a farewell gift for the gods, and the majority of them wanted to wheel it into their city.
  • This was seen by the Trojans as a sign that the gods were dissatisfied with Laocoon’s message.
  • The people of the city erupted in jubilation as the horse was permitted through the gates.
  • The Greeks then sacked, devastated, and set fire to the city of Troy.

Also known as: the horse, the wooden horse, and the wooden steed Because the Greeks were able to slip into Troy via the Trojan Horse’s belly, the Trojan Horse is credited as being the source of the following warning: Keep an eye out for Greeks who come carrying presents.

April 24, 1184 B.C.: Trojan Horse Defeats State-of-the-Art Security

While fighting in the Trojan War, the Greeks embark on their ships, leaving behind a massive wooden horse that served as a victory present to the victors. It is dragged inside the city’s walls, and Greek troops emerge from the horse’s belly at night to slaughter the city’s defenders and begin the destruction of the city. Whether or not this truly occurred, and whether or not the customary date assigned is correct, archeological evidence has proved that a Trojan War did take place in Asia Minor about 1200 B.C.

  1. However, it is by no means a legend.
  2. The conflict began when a prince of Troy eloped with Helen, the wife of the king of Sparta, igniting a rivalry between the two countries.
  3. The ladies in their lives were rated in milliHelens by snickering male college students throughout the years.
  4. Today, her name is associated with someone who does not heed the warnings of others.
  5. So, what cybersecurity lessons can we draw from the original Trojan Horse that we may use today?
  • A ten-year siege of Troy by the Greeks had gone unfruitful
  • Persistence was required. Things are not always what they appear to be in terms of epistemology. Virgil’s most recent update: Keep an eye out for people who bring presents. The Trojans, who adored horses and were overjoyed with the gift, were duped by social engineering when they received the horse. Engineering: The horse was mounted on wheels, which was intended to make it easier for the Trojans to drag it through their fortifications. Disregarding or ignoring warning signals: Cassandra and Laocoon were both ignored. Delay: The Trojan Horse did not inflict injury right away, but instead waited for the right moment
  • Size: It just required a few of Greeks to do a great deal of destruction
  • From the inside, they were able to undermine security by assassinating guards and unlocking the gates, thereby rendering Troy’s fortified walls ineffective. The Greek ships had returned to port, and their troops had surged ashore once more
  • The extent of the destruction was as follows: Troy was completely destroyed. Troy was defeated in the battle
  • The consequences were long-lasting.

Of course, the worst that may happen is that you lose your data, your hard drive, your thesis, your job, your money, your business, your identity, or some horrible combination of all of the aforementioned. (Image courtesy of Various) The original version of this article published on Wired.com on April 24, 2008.

What Is a Trojan Horse?

It is Homer’sIliad, which is considered one of history’s great literary classics, and which narrates the narrative of the Trojan horse—the wooden horse on which the Greeks concealed in order to infiltrate and conquer the city of Troy. Hackers utilize a digital Trojan horse to conceal dangerous files in seemingly innocent files with the purpose of attacking or taking control of your device two thousand and some odd years hence, according to some estimates. When it comes to dangers that might infect your computer or mobile device, a Trojan horse (also known as a Trojan) is one of the most frequent and hazardous.

Trojan horses come in a range of shapes and sizes, with many of them capable of launching intricate and cunning attacks. Some kinds to be aware of are as follows:

  • Trojan horses that collect passwords from your computer and send them to hackers are known as password-stealing Trojan horses. Some are even capable of stealing credentials that have been stored in your browser history.
  • These are extremely popular, because they let the attacker to gain complete control of your computer, including access to all of your data. Remote access Trojans If you have your password stored in your browser’s memory or on your computer, the hacker might possibly get access to your online banking and credit card accounts.
  • Destructive Trojans —These Trojans are capable of deleting and destroying data on your computer.
  • Avira and firewall killers —These Trojans are designed to identify and disable your antivirus and firewall products, allowing the attacker to get more access to your machine

A Trojan horse can be used for a single harmful purpose or for a variety of destructive purposes, which is what makes them so dangerous. In addition, it’s vital to remember that, in contrast to viruses, Trojans do not self-replicate and are only disseminated by users who unwittingly download them, generally via an email attachment or by visiting a website that has been compromised. Some precautions you may take to prevent downloading a Trojan horse are as follows:

  • Keep an eye out for emails that seem dubious. If you are not familiar with the sender of the email, do not open the attachment. Consider using a robust security program. Safeguard all of your devices with theMcAfee LiveSafeTMservice, and remain safe from spam, suspicious downloads, and viruses. Make a distinction between the good and the evil. When sending emails, use an email application that has a spam filter to reduce the likelihood of an infected email reaching your inbox
  • Recognize the dangers. Update your knowledge of current cyber-threats to be aware of the warning signs when you get dubious emails.

Keep in mind that Trojans are common because they are so effective. For example, hackers may employ social engineering tactics to entice you to click on their email by bringing up a current news item or a well-known celebrity in their message. Simply being aware of what they are and how they operate may save you from having to cope with money loss, identity theft, computer damage, and extended downtime.

Legend of the Trojan Horse for Kids (Beware of Greeks Bearing Gifts)

Beware of Greeks who come carrying presents, according to an ancient proverb. That old proverb dates back 2,500 years to the city-state of Sparta in ancient Greece, whence it derives.

As the story goes.

Once upon a time, there was a city called Troy on the coast of Turkey, and it was a thriving trade center. Athens was located on the other side of the Aegean Sea from the ancient Greek city-state of Sparta. As soon as the king of Sparta learned that his lovely wife, Helen, had been kidnapped by a prince of Troy, he appealed to the other Greek city-states for assistance in rescuing her. His phone call was picked up. A thousand Greek ships made sail for Troy on the day of the battle. The city of Troy was guarded by a high wall that had been constructed around it.

  • There were gates in the wall to let people to come and go, but the wall served as a strong defensive barrier for the inhabitants of Troy.
  • For almost 10 years prior to the events of this novel, Greek troops had been attempting to break the wall around Troy.
  • A technique was dreamt out by the legendary Greek general Odysseus, who saved the day when all appeared lost.
  • Odysseus proposed that the Greeks construct a massive, hefty, and magnificent wooden horse and station it outside the city gates of Troy.
  • However, it was a ruse.
  • There would be thirty men hidden inside.
  • As soon as they were finished, the Greek troops pretended to sail away, leaving the horse behind them.
See also:  How To Give Someone A Charley Horsewhat Does 9 2 Odds Mean In Horse Racing? (Best solution)

They pulled the massive horse through the city gates and put it on display, which was exactly what the Greek commander had predicted they would do – gloat over their victory.

Troy was invaded by the Greek army that had been waiting.

Is this old urban tale accurate?

It is referred to as the “legend of the Trojan horse” in certain circles.

The Trojan War is a term used to describe a conflict between two opposing groups of people.

The Trojan Horse, Troy, and Helen are three tales (click on download, that means play audio stories now) Is it true that ancient Troy existed?

(An animated, brief video for children) What happened to Odysseus, the renowned Greek commander who fought in the Trojan War, after the war? Homer’sIliad Homer’sOdyssey

What is a Trojan Horse? Definition from WhatIs.com.

In computers, a Trojan horse is a software that is downloaded and placed on a computer that looks to be innocent, but is in reality harmful to the system. It is quite likely that a Trojan is infecting a computer if it makes unexpected changes to its settings and performs odd activities even when the machine should be inactive. Typically, the Trojan horse is disguised as an innocent-looking email attachment or free download to trick the user into opening it. When a user opens an email attachment or downloads a free software, the virus that has been disguised within it gets transported to the user’s computer device.

How a Trojan horse works

Before a Trojan horse may infect a computer, the user must first download the infected application’s server side code from the malicious website. The Trojan horse is unable to appear on its own. In order for the assault to be launched on the system, the executable file (exe file) must be implemented, and the software must be installed. The use of social engineering strategies to persuade end users to download a malicious program is common practice in malware distribution. The download trap may be found in a variety of places, including banner adverts, internet links, and pop-up advertisements.

  • Spamming tactics are routinely employed by Trojan horse creators in order to deliver their emails to hundreds or thousands of recipients.
  • An infected computer may potentially be able to continue distributing the Trojan horse to other computers after it has been compromised.
  • Hackers utilize these zombie machines to continue disseminating further malware in order to build a network of zombie computers, which they call a zombie network.
  • Users of laptops and desktop computers are not the only ones who may be at danger of contracting a Trojan horse virus.
  • It is possible that an attacker would divert traffic on these Wi-Fi connected devices and use them to perform cybercrimes as a result of this type of contamination.
  • When the victim clicks on the attachment, malicious code is executed, and the victim is notified that this has happened.
  • The malicious code remains unnoticed until a specified date or when the victim does a specific activity, such as accessing a banking website, at which point it is identified.

At that point, the malicious code is activated and the anticipated action is carried out by the malicious code. After performing its intended job, the Trojan may self-destruct, revert to a dormant condition, or remain active, depending on how it was programmed into existence.

Uses of a Trojan horse

The activation of a Trojan horse puts sensitive user data at risk and has the potential to degrade performance. Once a Trojan has been transmitted, it can perform the following functions:

  • Give the attacker backdoor control over the computing device
  • Record keyboard strokes in order to steal the user’s account data and browsing history
  • Download and install a virus or worm in order to exploit a vulnerability in another program
  • Install ransomware in order to encrypt the user’s data and extort money for the decryption key
  • Turn the computing device into a zombie computer that can be used to carry out click fraud schemes or illegal activities

Examples of Trojan horses

Trojan horses have been identified over the years by anti-malware providers, security researchers, and private individuals, among other groups. Some of the more well-known finds are as follows:

  • Bitfrost was a remote access Trojan (RAT) that infected Windows clients by modifying, generating, and manipulating components
  • Tiny Banker was a banking Trojan that allowed attackers to steal critical financial information
  • And many other threats. The FakeAV Trojan, which was embedded in the Windows system tray and continuously delivered an official-looking pop-up window alerting the user to a problem with the computer, was discovered by researchers at the Center for Strategic and International Studies Security Group in 2012 after two dozen major U.S. banks were infected. The FBI developed Magic Lantern, a government Trojan that uses keystroke logging to assist with criminal surveillance, around the turn of the century. Zeus, a financial servicescrimeware toolkit that allows a hacker to build their own Trojan horse, was also downloaded when users followed the instructions to fix the problem. The Trojans produced using Zeus, which were first discovered in 2007, are still the most deadly banking Trojans in the world, employing form grabbing, keylogging, and polymorphic variations of the Trojan that utilize drive-by downloads to steal victim credentials
  • They were first discovered in 2007.

Other sorts of Trojan horses that are commonly seen are:

  • It is a Trojan horse called the Downloader Trojan, which is designed to infect a machine that has already been compromised by downloading and installing fresh versions of harmful applications. Backdoor Trojan: A Trojan horse that installs a backdoor on a computer, allowing an attacker to gain access to and control over the machine. Backdoor Trojans have the capability of allowing data to be copied or stolen by third parties, as well as the uploading of more malware. Trojan horse that launches a Distributed Denial of Service (DDoS) attack on a computer and attempts to bring down a network by flooding it with traffic that originates from the infected computer and other affected computers
  • A Trojan horse that targets internet gamers and seeks to steal their account information
  • A game-stealing Trojan horse This malware, known as the Mailfinder Trojan, attempts to collect email addresses saved on a targeted system. It is possible to transmit or intercept text messages with the help of the SMS Trojan, which is a Trojan that infects mobile devices and has the capacity to send or intercept text messages. Trojan banker is a malicious program that seeks to hijack banking accounts. This Trojan is meant to steal the account information for all online activities, including credit card, banking, and bill-pay information
  • However, it is not designed to steal financial information.

Is a Trojan horse a virus or malware?

A Trojan horse is sometimes referred to as a Trojan horse virus, however this is erroneous in terms of technical terminology. A Trojan horse, in contrast to a computer virus, is unable to duplicate itself and cannot spread without the help of the end user who has downloaded it. As a result, attackers must employ social engineering techniques in order to deceive the end user into installing the Trojan. Because there are so many distinct types of Trojan horses, the word can be used to refer to any virus that is delivered using a Trojan horse.

How to identify a Trojan horse

Because Trojan horses typically masquerade as genuine system files, they are notoriously difficult to detect and eliminate with standard virus and malware scanners, which makes them particularly dangerous. When it comes to the identification and eradication of discrete Trojan horses, specialized software tools are frequently required. However, it is possible to detect the existence of a Trojan horse by observing anomalous behavior presented by a computer system. The following are examples of quirks:

  • A change in the appearance of the computer screen, such as changing the color and resolution, or an unnecessarily flipping it upside down
  • Excessive numbers of pop-up advertisements will display, each promising a solution to a different fault, which may lead the end user to click on the advertisement. It is possible for the computer mouse to begin moving on its own or to freeze altogether, and the functions of the mouse buttons to reverse as a result. The browser’s home page may change, or the browser may redirect the user to a website that is different from the one they are seeking repeatedly. This redirected page will frequently contain an offer that visitors may click on or download, which will, in turn, allow further malware to be installed on their computers. In addition, the computer’s anti-virus and anti-malware applications will be deactivated, making it impossible to do the necessary procedures to eradicate infection. It is possible that mysterious messages and odd graphic displays will begin to surface. In the task manager, you will see that there are apps running that are not recognized. A change in look or full disappearance of the taskbar will occur. The desktop wallpaper of the computer, as well as the icon and program formats on the desktop, may be modified. Users’ personal email services may begin sending spam messages to all or portion of the addresses in their contact list, which typically contain malware and a persuasive strategy to entice recipients to open and download the attack, so spreading the Trojan horse to other systems.

The fact that safe, lawful software programs can potentially cause some of the unusual actions outlined above should not be underestimated. Aside from that, because of the similarities in their delivery techniques, adware and potentially unwanted programs (PUPs) are occasionally mistaken for Trojan horses. For example, adware may infiltrate a computer by concealing itself within a program installation package. Adware and potentially unwanted programs (PUPs) do not, in contrast to Trojan horses, attempt to obscure themselves once they have been installed on the computer.

How to protect against a Trojan horse

The most straightforward method of safeguarding a computer against a Trojan horse is to avoid opening or downloading emails or files from unfamiliar sources. The Trojan horse danger may be eliminated by deleting these communications before they are opened. Computer security, on the other hand, begins with and is dependent on the installation and use of an Internet security suite, which must be done before anything else. Because a Trojan horse is typically loaded without the user being aware of it, antimalware software must be used to identify malicious code, isolate it, and remove it from the computer system.

Users should practice conducting frequent diagnostic checks on their computers to avoid becoming infected with a Trojan horse. They should also maintain their antivirus and antimalware software up to date. Other suggestions for safeguarding a system include:

  • Updating the operating system (OS) software as soon as a new version is made available by the software company
  • Protecting personal accounts with complex and one-of-a-kind passwords that incorporate numbers, characters, and symbols is recommended. When opening any email attachment, including those from known senders, exercise caution since a Trojan horse may have infiltrated their machine and is exploiting it to propagate malware
  • And Creating frequent backups of files in order to ensure that they can be quickly retrieved in the event of a Trojan horse assault
  • Protection of personal information using firewalls is essential. avoiding websites that appear suspicious or hazardous
  • Internet security software may be used to identify which sites are secure and which sites should be avoided in certain situations. Installing or downloading products only from recognized, reputable sources is recommended. Pop-up advertisements that aim to lure viewers to click through for tempting offers and promotions should be avoided. It is best not to open an email if the subject, content, or sender are unfamiliar, or if there is any suspicion or query regarding the email in general
  • And

How to remove a Trojan horse

If a Trojan horse is discovered on a computer, the machine should be promptly unplugged from the Internet and the dubious files should be uninstalled using an antivirus or antimalware tool, or the operating system should be reinstalled, whichever is most convenient. One of the most difficult aspects of the cleanup procedure is determining which files are contaminated. Once the Trojan horse has been found, the remainder of the operation becomes much easier to accomplish. Using the dynamic link library (DLL) error that is commonly shown by the computer to indicate the existence of a Trojan horse, users may occasionally locate the infected files on their computer’s hard drive.

  • Identifying the files and disabling the System Restore mechanism are also necessary steps.
  • It is necessary for users to restart their computers after that.
  • Once the computer has been properly booted up, users should navigate to the Control Panel and select Add or Remove applications.
  • All of the program files related with the Trojan application should be erased from the system in order to guarantee that all of the extensions associated with the Trojan application are removed.
  • This should bring the Trojan horse eradication process to a conclusion.

History of the Trojan horse

It is believed that the word “Trojan horses” comes from Greek mythology. According to tradition, the Greeks constructed a massive wooden horse that the inhabitants of Troy used to transport themselves into the capital. During the night, troops who had been hidden within the horse surfaced, unlocked the city’s gates to let their fellow soldiers to enter, and overran the city with their fellow soldiers. The word “vulnerability” in computing was first used in a 1974 report by the United States Air Force, which explored the vulnerability of computer systems.

Increased use of bulletin board systems (BBS) throughout the 1980s contributed to the rapid proliferation of Trojan horse assaults during that time period.

Once a person has entered onto the BBS, he or she can proceed with behaviors such as uploading, downloading, and exchanging potentially harmful material with other users.

This early Trojan horse was able to infiltrate and infect around one million computers all across the world throughout its lifetime.

Once the Spy Sheriff Trojan horse has been successfully installed on a computer, it becomes exceedingly tough to uninstall from the machine in question.

A user who attempts to uninstall the Spy Sheriff program will find that the Trojan horse reinstalls itself using infected files that have been concealed on the machine.

A Trojan horse had downloaded the files without his knowledge, and the court took over a year to eventually clear him of all accusations and accept his defense, which said that the materials had been downloaded without his knowledge.

Interestingly, this is one of the first instances in which the Trojan horse defense has been proven viable. This was last updated inJune 2020

Continue Reading About Trojan horse (computing)

  • Using this antimalware software comparison, you can choose the best tool for the job.
  • How to uninstall a Trojan horse, a virus, a worm, and other sorts of malware from your computer
  • What is the novel approach that the Osiris banking Trojan employs
  • The top ten sorts of information security dangers that IT staff must be aware of

Dig Deeper on Threats and vulnerabilities

Leave a Reply

Your email address will not be published.