. . "Users typically get Trojan Horses by downloading a program, e.g. from the Internet, that seems safe or promises the user something like free online time." . .