Trojan Horse definition

Trojan Horse means a destructive computer program that enters onto a computer by pretending to be a simple and safe computer application.
Trojan Horse. “worm”, “drop dead device”, “virus” or other computer software routine intended or designed to:
Trojan Horse means code hidden in a legitimate program that when executed performs some unauthorized activity or function.

Examples of Trojan Horse in a sentence

  • Provider represents and warrants that any software licensed hereunder shall not contain any virus, worm, Trojan Horse, tracking software or be capable of identifying non-approved users or tracking any approved user, or any undocumented software locks or drop dead devices that would render inaccessible or impair in any way the operation of the software or any other hardware, software or data for which the software is designed to work with.

  • Provider represents and warrants that any software licensed hereunder shall not contain any virus, worm, Trojan Horse, tracking software or be capable of identifying non- approved users or tracking any approved user, or any undocumented software locks or drop dead devices that would render inaccessible or impair in any way the operation of the software or any other hardware, software or data for which the software is designed to work with.

  • The Contractor warrants that the work product and any other materials licensed hereunder do not knowingly contain any virus, worm, Trojan Horse, tracking software, or devices capable of identifying users or tracking use, or any undocumented software locks or drop-dead devices which would render inaccessible or impair in any way the operation of the work product or any other hardware, software, or data which the work product is designed to work with.

  • For purposes herein, “Illicit Code” will mean any key, node, lock, time-out, back door, trap door, booby trap, drop dead device, data scrambling device, Trojan Horse or other similar type means for enabling self-help, restraint, disabling program codes or other functions, whether implemented by electronic, mechanical or other means, which restricts or may restrict use or access to any portion of any Software or data or information created by or accessed using such Software.

  • Licensee and its subcontractors will ensure that each copy of the media containing the Software is manufactured under a quality assurance program designed to ensure that there is no virus or other embedded device or code in the Software (e.g., back door, time bomb, Trojan Horse or worm) that is intended to obstruct or prevent use of the Software.


More Definitions of Trojan Horse

Trojan Horse means a computer program with an apparent or actual useful function that
Trojan Horse means a destructive computer program that enters onto a computer by
Trojan Horse worm", "drop dead device", "virus" (as these terms are commonly used in the computer software industry), or other software routines or hardware components designed to permit unauthorized access, to disable or erase software, hardware or data or to perform any other similar type of functions;
Trojan Horse virus," "worm," "spyware" or "adware" (as such terms are commonly understood in the software industry) or any other code intentionally designed or intended to have, or capable of performing or facilitating, any of the following functions: (i) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed, or (ii) compromising the privacy or data security of a user or damaging or destroying any data or file without the user's consent.
Trojan Horse worm", "drop dead device", "virus" or any other computer software code which is intended or designed to:
Trojan Horse drop dead device" (as these terms are commonly used in the computer software industry), or other software routines designed to permit unauthorized access, to disable or erase software or data or to perform any other similar type of functions and, to the knowledge of the ESI Management, after running a worm and virus check using the procedures described in Schedule 3.8(b)(1) at a date not earlier than Monday, February 17, 1997, the Software does not contain any worm or virus;
Trojan Horse or other means for enabling codes or other functions, whether implemented by electronic, mechanical or other means, which is capable of restricting use or access to any portion of any Software or any data or similar information created by or accessed using the Software.