Method "Trojan horse" is a secret entry into someone else's program of commands that allow a new owner is not planned program functions, but at the same time preserve and earlier works. With the help of "Trojan horse" criminals, for example, pay at their own expense certain amount from each transaction.
Computer software texts are usually extremely complex. They consist of hundreds of thousands and sometimes millions of commands. The "Trojan horse" of the several dozen teams could hardly be found, unless, of course, there is no suspicion about this. But in the last - if it expert programmers take many days and weeks to find him.
An interesting case of "Trojan horse" one American programmer. He inserted into the computer company where he worked, the team did not otchislyayuschie money, and not to print outlet to report some income. These amounts, specially marked, "existed only in the system. Vulgar manner stolen letterhead, he filled them with an indication of its clandestine marking and received the money, and such transactions are still not printed and could not be subjected to audit.
There is another kind of "Trojan horse". Its peculiarity is that in bezobidno looking piece of the program is not inserted commands are actually doing "dirty" work. a team, forming this team and after the implementation of destroying them. In this case, the programmer, trying to find a "Trojan horse", must be sought not his own, and commands his form. Building on that idea, it is possible to imagine a team that created the team, etc. (arbitrarily large number of times), which pose a "Trojan horse".
In the U.S., spread a form of computer vandalism in which a "Trojan horse" breaks through a period of time, all the programs that are stored in the memory of the machine. Many arrived in the sale of computers was "temporary bomb, which" exploded "in the most unexpected moment, destroying the entire library of data.
Unfortunately, too many customers know that after the conflicts by the manufacturer of software that has so far worked well, suddenly started to behave very unpredictable ways and finally completely denied. Is not difficult to guess that copies on magnetic tapes or discs, providently made, the situation has not delivered.
There remained one way - go to confession to the developer.