See everything being typed: emails, messages, documents, username, password can then be sent back to its origin via e-mail, upload to a specific destination.
keyloggers have some legitimate uses, like a parent monitoring a child's Internet activity, or monitor employees while in a work environment. To delete all your restore points, but a lot of options available, and then shop around until you find something that meets your specifications. So every protective parent will choose a key logger is installed on your system. |