Trojan horse (computing) (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Trojan horse (computing)" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
14th place
14th place
2nd place
2nd place
low place
low place
1,669th place
1,290th place
low place
low place
1,053rd place
701st place
6th place
6th place
low place
low place
2,467th place
2,049th place
5,739th place
4,857th place
355th place
454th place
1,185th place
840th place
low place
low place
153rd place
151st place
3,633rd place
3,091st place
279th place
551st place
low place
low place
204th place
353rd place
low place
low place
low place
low place
low place
low place
5th place
5th place
702nd place
520th place
low place
7,673rd place
4,756th place
2,900th place
388th place
265th place

acm.org

dl.acm.org

acsac.org

admin.ch

ejpd.admin.ch

archive.org

archive.today

arstechnica.com

bell-labs.com

  • Thompson, Ken; Ritchie, Dennis M. "Unix Programmer's Manual, November 3, 1971" (PDF). p. 5. Retrieved March 28, 2020. Also, one may not change the owner of a file with the set—user—ID bit on, otherwise one could create Trojan Horses able to misuse other's files.

betanews.com

bitdefender.com

news.bitdefender.com

broadcom.com

knowledge.broadcom.com

collinsdictionary.com

  • "trojan". Collins Advanced Dictionary. Retrieved March 29, 2020.

doi.org

dw.com

lookout.com

blog.lookout.com

microsoft.com

docs.microsoft.com

nist.gov

csrc.nist.gov

online-journals.org

sans.org

securaid.com

sourceforge.net

  • orbitalsatelite (September 21, 2016). "Mega-Panzer". SourceForge.
  • orbitalsatelite (September 18, 2016). "Mini-Panzer". SourceForge.

techtimes.com

techworld.com

news.techworld.com

upenn.edu

cets.seas.upenn.edu

uu.nl

faqs.cs.uu.nl

uzh.ch

zora.uzh.ch

web.archive.org

worldcat.org

search.worldcat.org