This document discusses Trojan horse programs and remote administration tools. It defines Trojan horses as programs that appear harmless but have malicious code. Trojan horses can give intruders access to computers by installing backdoors. Remote administration tools also allow unauthorized access and control of victim's computers. The document provides examples of common Trojan horses and remote access programs like Back Orifice and describes how to detect and remove such threats.