TechWhirl (TECHWR-L) is a resource for technical writing and technical communications professionals of all experience levels and in all industries to share their experiences and acquire information.
For two decades, technical communicators have turned to TechWhirl to ask and answer questions about the always-changing world of technical communications, such as tools, skills, career paths, methodologies, and emerging industries. The TechWhirl Archives and magazine, created for, by and about technical writers, offer a wealth of knowledge to everyone with an interest in any aspect of technical communications.
At 10:50 AM 9/8/95, Pickett-Harner, Molly wrote:
>(Remember -- the [only significant] difference between a trojan horse and a
>virus is that the former invades & does whatever it's programmed to do
>whilst a virus does the same over & over.)
A Trojan Horse is introduced into a system under the guise of being a
utility, game, or what have you, and is executed by an unsuspecting user. A
Trojan Horse cannot replicate itself, execute itself, nor can it move to
other systems without human intervention. A Trojan Horse program sitting on
your hard disk is harmless until you execute it.
A virus attaches itself to an otherwise legit program, and can execute
itself, propagate itself to other programs, other systems, or cause system
damage, or both. Since I use a Mac, the only virus I'm familiar with is
WDEF, which infects the desktop file and is mostly harmless, but which will
infect the desktop files of every disk inserted. Luckily those Bulgarian
hackers only seem to have Wintel machines ;)
The end result is irrelevant. I'd say the program in question is a Trojan Horse.