Internet
Introduction
Internet Service Providers (ISPs)
Bloggers And Free Speech
Limits On Internet Usage
Privacy and Security on the Internet
WebTracking
E-Mail Privacy
Chat Rooms
Keystroke Monitoring
Spyware
E-Mail
Phishing
Downloads
Stopping Hackers
Viruses
Children's Security
Internet Commerce
Launching An Online Business
Internet Fraud
Television
Radio
Movie Rating Systems
Telephones
Faxes
Keystroke Monitoring
Certain programs can be installed on computers to monitor every keystroke the user makes and record them for later retrieval. These programs are also known as key logger programs and are often utilized by hackers hoping to find passwords or other useful information. Employers also use keystroke-monitoring programs to ascertain what an employee is doing on his computer.