This document discusses different types of Trojan horses and salami attacks. It defines a Trojan horse as a destructive program that masquerades as benign but can introduce viruses. The document outlines seven main types of Trojan horses, including remote access Trojans, data sending Trojans, and security software disabler Trojans. It then explains that a salami attack involves making small, unnoticeable changes incrementally, like rounding down bank interest amounts. Salami attacks can be used to gather information over long periods from many sources to learn about a target.