Like their namesake, Trojan horse viruses don’t actually look dangerous.
They’re attached to regular, commonly used applications.
Trojan keyloggers are sometimes called keystroke malware, keylogger viruses, and Trojan horse keyloggers.

Martin Holtkamp/Getty Images
These programs are technically considered keyloggers but not in the malicious sense.
What a Keylogger Trojan Does
A keylogger monitors and logs every keystroke it can identify.
It stores the information locally to share with the hacker through either physical or online access.
A keylogger can record anything it’s programmed to monitor.
Some keystroke malware can refrain from recording the keystrokes until a certain activity is registered.
One thing youcando is vet your software sources carefully.
Others are simply more prone to having keyloggers attached to them (such astorrents).
Get tips on avoiding keylogger viruses by learninghow to safely download and install software.
Another option is to use abootable antivirus program.
FAQ
It’s perfectly legal to install a keylogger on a equipment you own.
However, installing a keylogger on someone else’s rig without their consent is illegal.