About: Trojan Horse   Sponge Permalink

An Entity of Type : dbkwik:resource/3PtJFMd4zFaAm8on0c8QuA==, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

The Trojan Horse (Ancient Greek: Δούρειος Ἵππος/Doureios Hippos, meaning Wooden Horse) is a huge wooden construction, that appears in the Greek part of the Fall of the Trident campaign in Age of Mythology.

AttributesValues
rdf:type
rdfs:label
  • Trojan Horse
  • Trojan horse
  • Trojan Horse
rdfs:comment
  • The Trojan Horse (Ancient Greek: Δούρειος Ἵππος/Doureios Hippos, meaning Wooden Horse) is a huge wooden construction, that appears in the Greek part of the Fall of the Trident campaign in Age of Mythology.
  • In Greek mythology, the Greeks were besieging the city of Troy but could not break the Trojans' resistance. Then they built a huge wooden horse, in which they hid dozens of warriors. They gave it to the Trojans as a gift, which the Trojans accepted. Once inside the city, the warriors poured out of the horse and captured Troy.
  • The main ancient source for the story is the Aeneid of Virgil, a Latin epic poem from the time of Augustus. The event is referred to in Homer's Odyssey. In the Greek tradition, the horse is called the "Wooden Horse" (Δούρειος Ἵππος, Doúreios Híppos, in the Homeric Ionic dialect). Metaphorically a "Trojan Horse" has come to mean any trick or stratagem that causes a target to allow a foe into a securely protected bastion or space. A malicious computer program which tricks users into willingly running it is called a "Trojan horse".
  • The Trojan Horse was a tactical device, a troop transport disguised as an example of constructed sculpture, a statue depicting an artistic rendition of a horse. The Trojan Horse was used on ancient Earth by the Greeks at the seige of Troy, during the Trojan War. (TOS novel: The Fearful Summons)
  • NOTE: The Trojan Horse was removed from later versions of Fall from Heaven, as its main feature - the ability to not have your units pushed out of the border on a war declaration - was replaced by the Council of Esus's new ability.
  • A Trojan Horse is the nick-name given to Zodiac Boarding Craft, and, curiously, the name of the Bomb planted inside Troy Station.
  • "Trojan Horse" is the 19th episode of season 2, and the 43rd produced hour of Person of Interest. It originally aired on April 4, 2013.
  • Trojan Horse (トロイノモクバ Toroi no Mokuba?) is the final boss of the game Rockman.EXE Legend of Network. It is a Trojan horse that was inside RideMan.EXE. In battle, the boss has 2000 HP.
  • Named after the wooden horse from Greek mythology, a Trojan horse is a
  • The Trojan Horse is an idol in the Walls of Troy multiplayer map and is the target for the Trojans team. The Spartans try to protect this while trying to destroy the Statue of Apollo. It also appears on the Troy background for the Combat Arena of God of War: Ghost of Sparta.
  • When the Geek's supreme banana - IBM - said "Let there be code.", every Programming Language was created. Then, he created one minor apple for each language, such as Java, Pascal, C, C+ and C++. But IBM wasn't a good banana at all. He explored the money of the geeks, made a law for a compulsory daily sacrifice of a virgin geek (which is not that hard to find...) and ordered the geeks to make Code prayers for his pleasure. After that, some of the Geek priests, unhappy with the extremely hard-doing desires of IBM, have gone to the "Dark Side of The Code" and created themselves a brand new orange, later called "The Trojan Horse" . The geeks wanted vengeance for the creation of IBM by the humans. Since then, more and more Geeks have been invoking the Trojan Horse to do malevolent things to hum
  • Ever since Odysseus ended ten years of futile war with a spot of carpentry, this has been one of the favourite tactics of clever characters faced with impregnable defenses. In the simplest version, the Greeks simply hide inside a object which they know the Trojans will be unable to resist picking up and taking inside their defenses. If the Trojans aren't complete idiots, subterfuge will be used to get them to accept the object -- anything from disguising it as a Trojan vehicle up to a full-blown Xanatos Roulette. Common variations include hiding a well-trained animal inside the Trojan Horse, or a computer program. In Speculative Fiction the Horse itself might be a robot or shape shifter.
  • The Trojan horse was, in the epic poem The Aeneid, a wooden horse presented as gift to the city of Troy during the Trojan War which, when brought inside the city gates, was discovered to hold Greek troops inside. Over time, the term "Trojan horse" has come to mean any seemingly benign object which holds a hidden threat or danger. The term is also used in computer programming, to describe a damaging program disguised as a non-dangerous one. (VOY short story: "A Taste of Spam")
  • Trojan Horse is a tale from the Trojan War about the subterfuge that the Greeks used to enter the city of Troy and win the war. The Greeks constructed a huge wooden horse, and hid a select force of men inside. The Greeks pretended to sail away, and the Trojans pulled the horse into their city as a victory trophy. That night the Greek force crept out of the horse and opened the gates for the rest of the Greek army, which had sailed back under cover of night. The Greeks entered and destroyed the city of Troy, decisively ending the war. Dr. Daniel Jackson compared the Scarab miniature naquadah bomb placed inside Cassandra to the Trojan Horse. (SG1: "Singularity")
  • Computer viruses and trojans are often confused with each other and often used interchangeably. While their effects can be similar they are different primarily in how they infect your computer. A trojan can infect your computer through any odd executable file you might have downloaded (for whatever reason), and these days even from an infected media file. This means the user has to actively run or load something to infect their computer. Most trojans are activated through some form of Social engineering scheme.
  • A Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk. In one celebrated case, a Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus.
sameAs
Unit
  • Trojan Horse
dcterms:subject
orignalgame
  • Age of Mythology
ep num
  • 19(xsd:integer)
season num
  • 2(xsd:integer)
Resists
  • Pierce
  • Crush
  • Hack
bydate
  • by perculia 2014/01/02 3:32 PM
POIs image
  • 150(xsd:integer)
LoS
  • 10(xsd:integer)
POIs
dbkwik:ageofempire...iPageUsesTemplate
dbkwik:all-the-tro...iPageUsesTemplate
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software