Warning: Illegal string offset 'sfsi_rectsub' in /home/gdashleycyber/public_html/wp-content/plugins/ultimate-social-media-icons/libs/controllers/sfsiocns_OnPosts.php on line 52
Warning: Illegal string offset 'sfsi_rectfb' in /home/gdashleycyber/public_html/wp-content/plugins/ultimate-social-media-icons/libs/controllers/sfsiocns_OnPosts.php on line 55
Warning: Illegal string offset 'sfsi_rectshr' in /home/gdashleycyber/public_html/wp-content/plugins/ultimate-social-media-icons/libs/controllers/sfsiocns_OnPosts.php on line 58
Warning: Illegal string offset 'sfsi_recttwtr' in /home/gdashleycyber/public_html/wp-content/plugins/ultimate-social-media-icons/libs/controllers/sfsiocns_OnPosts.php on line 61
Warning: Illegal string offset 'sfsi_rectpinit' in /home/gdashleycyber/public_html/wp-content/plugins/ultimate-social-media-icons/libs/controllers/sfsiocns_OnPosts.php on line 64
Warning: Illegal string offset 'sfsi_rectfbshare' in /home/gdashleycyber/public_html/wp-content/plugins/ultimate-social-media-icons/libs/controllers/sfsiocns_OnPosts.php on line 67
Any malicious computer program which is used to hack into a computer by misleading users of its true intent. The term is derived from the Ancient Greek story of the wooden horse that was used to help Greek troops invade the city of Troy by stealth.