Example Of Trojan Horse Attacks