A method of stealing several things at once. You put a bunch of small items into a large container, and then pay for just the container. Concealing the other stolen items.
by Red DUKE January 6, 2018
Get the reverse trojan mug.When a guy is denied morning sex by a girl who instead falls back to sleep. As an act of revenge, the guy places a used condom over the sleeping girl's upper lip then leaves.
I left that hoe with a trojan mustache after she wouldn't wake up for an early morning grind session
by j Dr G August 5, 2009
Get the Trojan Mustache mug.Related Words
by Fantastic Mr. Troll August 1, 2012
Get the Trojan Go-Gurt mug.A member of a great family that has an alumni network of over 300,000 members worldwide. It is currently ranked higher than UCLA, NYU, UVA, Tuft, Michigan - Ann Arbor and many other prestigious universities. In the past 5 years USC has won 4 Rosebowls and 2 national championships. Some graduates from USC include Forrest Whitaker, Kyra Sedgwick, George Lucas, and Mark Sanchez. Included on the faculty is Dr. Paul Frommer, a linguistics professor who created the Na'vi language. The 5 true characteristics one must have to be a Trojan are FAITHFUL, SCHOLARLY, SKILLFUL, COURAGEOUS, and AMBITIOUS. USC gives over 600 million dollars in scholarships every year to make sure that financial problems do not stand in the way of a student and their proper school. The Trojan Marching Band is considered the greatest band in the history of the universe.
Interviewer: Where did you go to school?
Interviewee: I went to USC. I'm a Trojan.
Interviewer: You're hired.
Prospy 1: Did you see Tommy Trojan over there?
Prospy 2: Yeah he looks so glorious. I hope I get in and don't have to settle for UCLA...
Interviewee: I went to USC. I'm a Trojan.
Interviewer: You're hired.
Prospy 1: Did you see Tommy Trojan over there?
Prospy 2: Yeah he looks so glorious. I hope I get in and don't have to settle for UCLA...
by UCLAsucks!!! September 16, 2010
Get the Trojan mug.A play that is run when a boy and girl want to have some privacy at either one of their houses, but they need to keep it a secret from friends and neighbors. They run the play by meeting up at a remote location, where one of them climbs into the backseat of the other's car and lays down, so they drive together into the garage of the home with no one seeing. The garage door is then closed behind them, and they are free to enjoy each other for several hours, uninterrupted.
Girl: I'm home alone, and I need to see you. So, so, bad. But everyone will see if you cum over here right now.
Boy: Ya. Um... Not if we run the Trojan Horse. Let's set it up. I'll meet you a few blocks from your house in 30 minutes.
Girl: Yes! Perfect!
Boy: YOU are.
Boy: Ya. Um... Not if we run the Trojan Horse. Let's set it up. I'll meet you a few blocks from your house in 30 minutes.
Girl: Yes! Perfect!
Boy: YOU are.
by bd_16_100 April 13, 2017
Get the Trojan Horse mug.Trojans AKA RATs (remote administraion tools) are pretty cool tools which you can use to gain access to a remote PC. You can do lots of things to the remote PC you are controlling you can open/close cd drive, remote shell(Command line), Screen/cam campture, Passwords, Key logger, download/upload files, execute+delete files Etc.
To access a remote PC Via RATs you must execute a Server (trojan) on the remote PC Either by sending via Email or MSN etc
To access a Remote PC you must first build your server which when executed on the remote PC will connect to your PC this is called Reverse connection where you can gain control of PCs behind Routers and Networks.
When building your server you will be asked to enter your DNS/Static IP so the remote PC can connect to your PC through a Port of your choice
Using these tools does NOT mean you are a hacker because it requires no skill and is easily detected by Anti-viruses (even though you can buy a Undetectable trojans)
Unfortunately RATs have fallen into the hands of immature people who send trojans to their friends and format their drives for no reason at all.
Programmers Often spend alot of time Building these Tools and most dont get enough respect for it.
So be careful what you download it could be a trojan and a immature noob could steal your data and your passwords
To access a remote PC Via RATs you must execute a Server (trojan) on the remote PC Either by sending via Email or MSN etc
To access a Remote PC you must first build your server which when executed on the remote PC will connect to your PC this is called Reverse connection where you can gain control of PCs behind Routers and Networks.
When building your server you will be asked to enter your DNS/Static IP so the remote PC can connect to your PC through a Port of your choice
Using these tools does NOT mean you are a hacker because it requires no skill and is easily detected by Anti-viruses (even though you can buy a Undetectable trojans)
Unfortunately RATs have fallen into the hands of immature people who send trojans to their friends and format their drives for no reason at all.
Programmers Often spend alot of time Building these Tools and most dont get enough respect for it.
So be careful what you download it could be a trojan and a immature noob could steal your data and your passwords
Noob: Hey, accept this its a well good game
Guy: wtf this makes my PC slow
Noob: HAHAHAHH GIMME UR HOTMAIL PASSWORD OR ILL FORMAT UR PC
Guy: no way noob
Noob: U ASK3d FOR IT LOL IM SO LEET I HACKED U
Guy: hey wat doing to my PC u send me fucking trojans didnt you
Noob: Kekekekeke ^^
Guy: wtf this makes my PC slow
Noob: HAHAHAHH GIMME UR HOTMAIL PASSWORD OR ILL FORMAT UR PC
Guy: no way noob
Noob: U ASK3d FOR IT LOL IM SO LEET I HACKED U
Guy: hey wat doing to my PC u send me fucking trojans didnt you
Noob: Kekekekeke ^^
by hisham April 3, 2007
Get the Trojans mug.