Content protected from screenshots
Question

What is a Trojan horse in computing?