Abstract: In all industries in trade in these days, desktops and IT sectors are a giant and indulging infrastructure. Employees in all divisions from HR to program progress expect a computing device and/or network connector as a way to do their jobs effortlessly. Still people in the field are needed to hold a desktop or several form of the hand held the device to broadcast information. This approach to the arena has introduced a quantity of recent protection associated subject to the work drive. One of the crucial matter includes the manufacturers proper to keep manage over InfoTech and educational institutes belongings which furnish staff with an opportunity to silently execute private events. There are over hundreds entirely unexpected stock realistic now a days that might let organizations notice what their clients act at job on their desktops, of their e-mail and on cyberspace. However what do such statistics fairly represent? What do organization keep an eye on of user/employee electronic message, web and PC utilization truly look like? In this study, we provide a survey results conducted on both students and staff in our college and explanation of why you need to monitor your employees, concept of key loggers and the client server based interception of keyloggers. The key logging project captures all strokes of keys along with the title of the appliance where in the keystrokes had been pressed. Using this, we seizing all knowledge in textual content and photo type.
R. Venkatesh and K. Raja Sekhar, 2016. User Activity Monitoring Using Keylogger. Asian Journal of Information Technology, 15: 4758-4762.