A similar technique for spreading trojan horses is to send files to unsuspecting users over chat systems like IRC, AIM, ICQ, MSN, or Yahoo Messenger. The attacker will send the victim an e-mail with an attachment called something like "prettygirls.exe." When the victim opens the attachment to see the pretty girls, the trojan horse will infect his system. A more common method of spreading a trojan horse is to send it via e-mail.
This was done by an attacker who broke into the distribution sites for these software packages and replaced the original distributions with his own packages. In 2002, the sendmail and OpenSSH packages were both used to hide trojan horses. One way to spread a trojan horse is to hide it inside a distribution of normal software. The Computer Trojan Horse A computer trojan horse is a program which appears to be something good, but actually conceals something bad. As the Trojans slept, the Greek army sailed back to Troy and the soldiers hiding in the wooden horse snuck out and opened the gates of the city for them. Instead, the horse was filled with Greek warriors, including Odysseus and Menelaus. The Trojans believed the horse to be a peace offering from Odysseus. He then ordered the Greek army to sail away.
Odysseus had a large wooden horse built and left as a "gift" outside the walls of the city of Troy.
The Greeks were losing the siege of the city of Troy. The original trojan horse was built by Odysseus, the King of Ithica, during the legendary Trojan Wars. Can anyone tell about the trojon horse history ?