1. By Andrew Ranson 2. Remembers every key pressed by the computer operator Sometimes used for illegal purposes e.g. Stealing passwords or encryption keys Can be used by…