| http://www.w3.org/ns/prov#value | - Indeed, the university specifically defines Trojan Horses in a detailed guide available at available at http://www.uga.edu/compsec/use.html : A Trojan horse is a program with a hidden, destructive function, or a program designed to trick users into revealing confidential information such as passwords.
|