Any program that causes unexpected effects when
willingly installed or run by an unsuspecting user. These programs are
generally deeply buried in the code of the target program and lie dormant
for a specified period.The code in
a Trojan Horse waits until some predetermined time or condition to act.
They are triggered by any number of events such as time of day, date, or
number of accesses to a file.