The document is a presentation by Angelina Rudenko on programming Trojan horses, aimed at educating about computer viruses and protection. It details the steps involved in creating a Trojan horse, including considering what people need and the importance of testing. The conclusion emphasizes the ease of creating such malware and advocates for using firewalls and antivirus software to protect against attacks.