A trojan horse simply cannot operate autonomously.
As a common type of Trojan horses, a legitimate software might have been corrupted with malicious code
which runs when the program is used. The key is that the user has to invoke the program in order to trigger the
In other words, a trojan horse simply cannot operate autonomously. You would also want to know that most but
not all trojan horse payloads are harmful – a few of them are harmless.