This document discusses Trojan horses, which are malicious programs that masquerade as legitimate software. It defines Trojans, explains how they work by tricking users into installing programs that then allow attackers access, and categorizes common types like remote access and data sending Trojans. The document also lists some notable Trojans like Zeus and Flashback, describes how Trojans are used for illegal activities like data theft, and provides tips for preventing Trojan infections like using firewalls and avoiding suspicious downloads.