This document discusses Trojan horses, which are unauthorized programs that perform unwanted functions on a user's computer. It defines Trojans and explains how they work, providing examples of common Trojans like remote access Trojans and password stealing Trojans. The document also outlines how Trojans are transmitted and describes ways for users to obtain and install a Trojan on another person's computer without their consent.