A Trojan is a type of threat named after the Trojan Horse of Greek mythology. Like
               the Greek Trojan Horse, a Trojan network threat has malicious intent, hidden within
               its code. While a Trojan might appear innocent, executing a Trojan can cause unwanted
               system problems in operation, data loss, and loss of privacy.
            For example, a Trojan called "happy birthday" might play a song and display an animated
               dance on your screen, while at the same time opening a port in the background and
               dropping files that allow malicious hackers to take control of the computer for whatever
               scheme or exploit he or she might have in mind. One common scheme is to hijack the
               computer for distributing spam. Another is to collect keystrokes and send them—along
               with all the data they contain—to the malicious hacker.
            Trojans are not viruses. Unlike viruses, they do not infect files, and they do not
               replicate. Because a Trojan does not infect a file, there is nothing to clean, though
               the scan engine might report the file as "uncleanable" and delete it, quarantine it,
               or take whatever action you specify.
            With Trojans, however, simply deleting or quarantining them is often not enough to
               rid your system of the Trojan’s effects. You must also clean up after it; that is,
               remove any programs that might have been copied to the machine, close ports, and remove
               registry entries.
            See also: