• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / Reviews / Book Review: Trojan Horse by Mark Russinovich

Book Review: Trojan Horse by Mark Russinovich

2013-01-20 by Jason

Trojan Horse, a cyber-thriller by Microsoft Fellow Mark Russinovich, is the second in the series after Zero Day. If you remember my Zero Day review, the book was recommended read for any with a technical inclination. Since then, a short called Operation Desolation also came out for the Kindle and was also found to be very enjoyable in its bite-size adventure format.

I finally had the chance to complete reading Trojan Horse, a full-size novel of over 300 pages. It follows the same main characters from Zero Day, Jeff Aiken and Daryl Haugen. They investigate a malware infection that leads them to quite an adventure with high risks and little reward.

The malware that takes center stage in Trojan Horse is quite clever and particularly insidious. E-mails and reports could not be trusted that they haven’t been modified. Able to confound electronic communication by not knowing if the true message was sent and received, it takes things to a whole new ballgame than the first noticed symptoms of a carefully modified document.

My favorite part of the book is how it revolves around Stuxnet. The relationship between Iran and China is laid out in the book with Stuxnet as a means for “you scratch my back, I scratch your back”. All told, the technical details, as one would expect from Mr. Russinovich’s pen are accurate and in the right place. Malware is at a point where it does not have to be embellished for fiction. If you are interested in technology and wonder about they cyber warfare between nation-states, this book will provide a sound example of the chess match taking place without us even knowing. Perhaps this might scare us in the right direction to start innovating in security means or at least making it a higher priority on huge projects like the nation’s Smart Grid.

Pick up Trojan Horse as a solid sequel to Zero Day. 4/5 stars.

Trojan Horse by Mark Russinovich

Filed Under: Reviews

Trending

  • AuditMyPC.com – Firewall, Privacy, and Popup Test Your Setup
    In Media, Security and Privacy
  • Could Google Fiber become the only ISP?
    In Infographics
  • Simple Tip: How to Rename Your Computer
    In System Administration, Tech Solutions

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • Access to the resource [servershare] has been disallowed Access to the resource [servershare] has been disallowed
  • Read the Event Logs on Windows Server Core Read the Event Logs on Windows Server Core
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Setup your DFS namespace with DNS for compatibility in a mixed environment Setup your DFS namespace with DNS for compatibility in a mixed environment
  • How Virtual Reality Supports Mental Health Therapy How Virtual Reality Supports Mental Health Therapy
  • Key Strategies of Successful Coin Listing on Exchange Key Strategies of Successful Coin Listing on Exchange
  • Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting
  • Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams
  • customer contactless payment for drink with mobile phon at cafe counter bar,seller coffee shop accept payment by mobile.new normal lifestyle concept The Latest Innovations In Payment Technology
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • How Virtual Reality Supports Mental Health Therapy
  • Key Strategies of Successful Coin Listing on Exchange
  • Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in