What is another word for Trojan Horse?
Pronunciation:
[ tɹˈə͡ʊd͡ʒən hˈɔːs], [ tɹˈəʊdʒən hˈɔːs], [ t_ɹ_ˈəʊ_dʒ_ə_n h_ˈɔː_s]
Table of Contents
Synonyms for Trojan horse:
n.
-
•
- bot,
- computer program,
- add-on,
- client,
- compiler,
- architecture,
- applet,
- bootstrap program,
- assembler,
- browser.
Other synonyms:
• Other relevant words:- deceit,
- scourge,
- play a joke on,
- hustle,
- scrunch up,
- fancy,
- flesh,
- caper,
- machinate,
- addition,
- fearfulness,
- mettlesome,
- sand trap,
- trope,
- enter,
- joke,
- coconspirator,
- biz,
- evasive action,
- skullduggery,
- skulduggery,
- incubate,
- crippled,
- channelize,
- jeopardize,
- dodging,
- antic,
- pin down,
- plat,
- shape,
- rumple,
- reckon,
- hush-hush,
- bunco,
- legerdemain,
- care,
- customer,
- booby trap,
- immobilise,
- chance,
- shenanigan,
- anatomy,
- guess,
- hatching,
- point,
- chassis,
- dissembling,
- parry,
- reverence,
- run a risk,
- gamble,
- patch,
- bunker,
- machinator,
- outline,
- convenience,
- spunky,
- building block,
- wrecker,
- circumvent,
- concoct,
- compiling program,
- pull a fast one on,
- ambush,
- forecast,
- tactical maneuver,
- burn,
- bunko game,
- trammel,
- schema,
- elude,
- con game,
- ruckle,
- stalking-horse,
- seam,
- furrow,
- twinge,
- calculate,
- gimmick,
- see,
- put-on,
- hocus-pocus,
- fob,
- physique,
- fifth columnist,
- system,
- head,
- gob,
- magic trick,
- insect bite,
- pang,
- program,
- put on the line,
- veneration,
- riskiness,
- diversionist,
- take a chance,
- brood,
- hatchback door,
- gaming,
- appliance,
- queer,
- crosshatch,
- expose,
- noose,
- pattern,
- confidence game,
- visualize,
- gage,
- imperil,
- hedge,
- assembly program,
- pretense,
- conjure,
- gimpy,
- cypher,
- guile,
- scupper,
- punt,
- ensnare,
- complot,
- luck,
- awe,
- count on,
- whole,
- flim-flam,
- play a trick on,
- stinging,
- blind,
- mapper,
- concern,
- set up,
- fudge,
- soma,
- human body,
- jiggery-pokery,
- bet on,
- fox,
- estimate,
- widget,
- lay on the line,
- back,
- secret plan,
- name,
- pretend,
- conjuration,
- purse,
- evade,
- cakehole,
- wager,
- image,
- liftgate,
- guide,
- web browser,
- illusion,
- bunko,
- picture,
- dread,
- clandestine,
- immobilize,
- fright,
- figure of speech,
- conspirative,
- frame,
- spirited,
- duck,
- lame,
- conjuring trick,
- slickness,
- endanger,
- node,
- fortune,
- connive,
- hatchback,
- project,
- design,
- form,
- take chances,
- flimflam,
- dissimulation,
- dream up,
- hook,
- revere,
- number,
- dardanian,
- think up,
- misrepresentation,
- risk of infection,
- plot of land,
- gin,
- fast one,
- gismo,
- contraption,
- bod,
- bet,
- stake,
- bait,
- stick,
- lying in wait,
- unit of measurement,
- public figure,
- digit,
- hachure,
- accessory,
- steerer,
- guest,
- gadget,
- gamey,
- hole-and-corner,
- ambuscade,
- envision,
- manoeuver,
- play tricks,
- gamy,
- undercover,
- gritty,
- conspirator,
- manoeuvre,
- adventure,
- twist,
- terror,
- diagram,
- chicane,
- halting,
- plot of ground,
- appurtenance,
- hugger-mugger,
- snare drum,
- whoremaster,
- strategy,
- prick,
- prank,
- halt,
- gizmo,
- visualise,
- operate,
- maw,
- lash-up,
- bite,
- whoremonger,
- pretence,
- pit,
- supplement,
- material body,
- confidence trick,
- surreptitious,
- put off,
- direct,
- tactic,
- collude,
- simulated military operation,
- compute,
- think of,
- pin,
- venerate,
- crumple,
- crisp,
- computer architecture,
- cipher,
- programme,
- cabal,
- scrunch,
- venture,
- intrigue,
- underground,
- sting operation,
- devisal,
- steer,
- sidestep,
- schemer,
- jeopardise,
- jeopardy,
- work out,
- fig,
- gambit,
- build,
- line,
- yap,
- wile,
- risk of exposure,
- virus,
- channelise,
- guise,
- lure,
- hole,
- crinkle,
- cover,
- side drum,
- threaten,
- improver,
- con,
- play,
- crease,
- skirt,
- plug-in,
- physical body,
- secret,
- magic,
- dardan.
How to use "Trojan horse" in context?
Trojan Horse is a malicious computer program that masquerades as a useful program or application, when in reality it is a piece of malware that can infect a user's computer. Once installed, Trojan Horse can enable the hacker to spy on, track, and capture the user's personal data. It can also spread malware to other computers, and can even enable the hacker to take over the computer.
Trojan Horse has been used by hackers to infiltrate government, military, and corporate networks all over the world.
Word of the Day
- Synonyms:
- Chambering.