What Is a Trojan Horse? (2024)

What Is a Trojan Horse? (1)

Wonder of the Day #938

Previous wonder Next wonder

Listen Immersive Reader

Print 28 Comments

What Is a Trojan Horse? (17)

LANGUAGE ARTSLiterature

Have You Ever Wondered...

  • What is a Trojan horse?
  • What epic poem contains the story of the Trojan horse?
  • What might a modern-day Trojan horse look like?

Tags:

See All Tags

  • Aeneid,
  • ancient,
  • battle,
  • computer,
  • cultures of the world,
  • deceive,
  • deception,
  • disguise,
  • fake,
  • Greece,
  • Greek,
  • history,
  • horse,
  • language,
  • malware,
  • myth,
  • Odysseus,
  • technology,
  • trick,
  • Trojan,
  • Troy,
  • Virgil,
  • war

Today's Wonder of the Day takes us on a trip way back to the time of the Trojan War. As told in Virgil's Aeneid, a famous epic poem, the Greeks had tried to conquer the ancient city of Troy and the Trojan people who lived there for over 10 years.

They finally succeeded, thanks to a devious bit of trickery. The Greeks, under the guidance of Odysseus, built a huge wooden horse — the horse was the symbol of the city of Troy — and left it at the gates of Troy. They then pretended to sail away.

The Trojans believed the huge wooden horse was a peace offering to their gods and thus a symbol of their victory after a long siege. They pulled the giant wooden horse into the middle of the city.

They didn't realize that the Greeks had hidden a select group of soldiers inside the horse. That night, after the Trojans had gone to bed, the Greek soldiers inside the horse were able to get out and open the gates of the city to let in the remainder of the Greek army, which had sailed back under the cover of night.

Taking the Trojans by surprise in the middle of the night, the Greeks were able finally to conquer Troy. Today, the term “Trojan horse" is still used to refer to any kind of deception or trick that involves getting a target willingly to allow an enemy into a secure place.

The Trojan horse is also the source of the nickname “Trojans" for computer programs — called malware — that can infect computer systems. Many of these harmful programs appear to be useful or merely harmless programs. In this way, they convince users to install and run them, not realizing what harm they can do once they're installed.

Wonder What's Next?

Even an apple a day won’t keep tomorrow’s Wonder of the Day away!

Try It Out

Would you fall for the old Trojan horse trick today? Probably not…especially if you had some good friends and family members by your side! Round up a few of those to help you check out one or more of the following activities:

  • Do you like reading the ancient Greek myths? It's amazing how much of today's popular culture, including old sayings, come from these old stories. Jump online and have some fun today reading through Some Great Greek Myths! Which are your favorites? Why? Can you identify any old sayings or modern pop culture references that got their start in an ancient Greek myth?
  • Would a Trojan horse work today? What do you think? If you received a giant wooden horse on your doorstep, wouldn't you be just a wee bit suspicious? Probably! But what type of gift might you readily receive? If you opened your door and found a…what? A video game console? A new cell phone? A life-size model of your favorite pop star? What would it take for you to open your arms and welcome it into your house? Of course, such items wouldn't hold an army. But what could they hold? A listening device? A hidden video camera? A super-secret brain scanner from the future? Yikes! Think about what a Trojan horse might look like today and write a short story explaining how it might work. When you're finished, post your story to Facebook for all your Wonder Friends to read. We can't wait to see how creative you are!
  • Up for a challenge? The National Science Center (NSC) has created a fun game to help children of all ages learn about cyber security, including how to recognize malware and not fall prey to computer “trojans." Do you surf the web, use email, or use cell phones? Then learn to stay safe with NSC Cyber Security tactics. Test your skill against Cyber Swarm! Use Defenders to stop them in their tracks! These guys mean business when it comes to messing with cyber security. Learn how to beat them at their own game.

Did you get it?

Test your knowledge

Wonder Words

  • secure
  • epic
  • infect
  • install
  • deception
  • device
  • suspicious
  • conquer
  • ancient
  • devious
  • trickery
  • guidance
  • malware
  • console
  • Trojan
  • siege
  • scenario

Take the Wonder Word Challenge

You Got It!

What Is a Trojan Horse? (18)

Continue

Not Quite!

What Is a Trojan Horse? (19) Try Again

What Is a Trojan Horse? (2024)
Top Articles
Top U.S. Housing Market Indicators
Natural Gas (NGM23) Quote
Belle Meade Barbershop | Uncle Classic Barbershop | Nashville Barbers
2024 Fantasy Baseball: Week 10 trade values chart and rest-of-season rankings for H2H and Rotisserie leagues
Canelo Vs Ryder Directv
The Haunted Drury Hotels of San Antonio’s Riverwalk
Umn Biology
Slmd Skincare Appointment
6th gen chevy camaro forumCamaro ZL1 Z28 SS LT Camaro forums, news, blog, reviews, wallpapers, pricing – Camaro5.com
WWE-Heldin Nikki A.S.H. verzückt Fans und Kollegen
Kitty Piggy Ssbbw
Check From Po Box 1111 Charlotte Nc 28201
Craiglist Kpr
Vipleaguenba
3476405416
ZURU - XSHOT - Insanity Mad Mega Barrel - Speelgoedblaster - Met 72 pijltjes | bol
Craigslist Clinton Ar
Adt Residential Sales Representative Salary
Great Clips Grandview Station Marion Reviews
Bethel Eportal
Rs3 Ushabti
F45 Training O'fallon Il Photos
Обзор Joxi: Что это такое? Отзывы, аналоги, сайт и инструкции | APS
2487872771
O'reilly Auto Parts Ozark Distribution Center Stockton Photos
In Branch Chase Atm Near Me
Poster & 1600 Autocollants créatifs | Activité facile et ludique | Poppik Stickers
Tributes flow for Soundgarden singer Chris Cornell as cause of death revealed
Justin Mckenzie Phillip Bryant
Nsu Occupational Therapy Prerequisites
Suspect may have staked out Trump's golf course for 12 hours before the apparent assassination attempt
Glossytightsglamour
Iban's staff
Consume Oakbrook Terrace Menu
Asian Grocery Williamsburg Va
Delaware judge sets Twitter, Elon Musk trial for October
Eastern New Mexico News Obituaries
Is The Nun Based On a True Story?
Columbia Ms Buy Sell Trade
Indiana Jones 5 Showtimes Near Cinemark Stroud Mall And Xd
Tryst Houston Tx
Craigslist Com Panama City Fl
Courses In Touch
Online-Reservierungen - Booqable Vermietungssoftware
Babykeilani
Conan Exiles Colored Crystal
Erica Mena Net Worth Forbes
FactoryEye | Enabling data-driven smart manufacturing
Guy Ritchie's The Covenant Showtimes Near Look Cinemas Redlands
Dmv Kiosk Bakersfield
Leslie's Pool Supply Redding California
Latest Posts
Article information

Author: Jeremiah Abshire

Last Updated:

Views: 6060

Rating: 4.3 / 5 (54 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Jeremiah Abshire

Birthday: 1993-09-14

Address: Apt. 425 92748 Jannie Centers, Port Nikitaville, VT 82110

Phone: +8096210939894

Job: Lead Healthcare Manager

Hobby: Watching movies, Watching movies, Knapping, LARPing, Coffee roasting, Lacemaking, Gaming

Introduction: My name is Jeremiah Abshire, I am a outstanding, kind, clever, hilarious, curious, hilarious, outstanding person who loves writing and wants to share my knowledge and understanding with you.