{"componentChunkName":"component---src-templates-dictionary-term-tsx","path":"/dictionary/trojan","result":{"data":{"contentfulDictionaryTerm":{"title":"Trojan","slug":"trojan","descriptionMeta":{"childMarkdownRemark":{"rawMarkdownBody":" A blog post that discusses what a Trojan is, how Trojans are used by cybercriminals to attack computer systems and networks."}},"body":{"body":"# Trojan\n\nMalicious programs that pretend to be legitimate software, but actually carry out harmful functions without the user’s knowledge. This form of malware is usually embedded into host files. When the file is in use, the malware is stored on the computer system and can gain access to programs on the computer it is designed to attack","childMarkdownRemark":{"htmlAst":{"type":"root","children":[{"type":"element","tagName":"h1","properties":{"id":"trojan","style":"position:relative;"},"children":[{"type":"text","value":"Trojan"},{"type":"element","tagName":"a","properties":{"href":"#trojan","ariaLabel":"trojan permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Malicious programs that pretend to be legitimate software, but actually carry out harmful functions without the user’s knowledge. This form of malware is usually embedded into host files. When the file is in use, the malware is stored on the computer system and can gain access to programs on the computer it is designed to attack"}]}],"data":{"quirksMode":false}}}}}},"pageContext":{"title":"Trojan","slug":"trojan","keepLearning":[{"title":"URL (Uniform resource locator)","slug":"url-uniform-resource-locator"},{"title":"URL or Web Content Filtering","slug":"url-or-web-content-filtering"},{"title":"Unauthorized access","slug":"unauthorized-access"}],"breadcrumb":{"location":"/dictionary/trojan","crumbs":[{"pathname":"/","crumbLabel":"Homepage"},{"pathname":"/dictionary","crumbLabel":"dictionary"},{"pathname":"/dictionary/trojan","crumbLabel":"trojan"}]}}},"staticQueryHashes":["1614255152"]}