Trojan or Trojan Horse is a general term that refers to programs that appear desirable, but actually contain something potentially harmful. It gets its name from the Trojan Horse that was an instrument of war used by the Greeks to gain access to the city of Troy. It looked like a gift of a giant wooden horse, but actually concealed soldiers inside.
The harmful contents could be anything, for example you may download what looks appears to be a free game, but when you run it, it opens up a port on your computer where a hacker can "remote control" your machine. A trojan's may also carry other payloads like a virus or worm, which then spread more damage. Read More
Category Description
Programs designed to monitor user activity. They may be used with or without consent. Because it is sold commercially, many anti-virus vendors do not detect them. The most common form of a commercial monitoring tool comes in the form of a keystroke logger, which intercepts keystrokes from the keyboard and records them in a log. This can then be sent to whoever installed the software, or keylogger, onto the machine. Some Commercial Monitoring Software may take screenshots or video and send the information to an outbound connection.
Comment
From their site:
"A simple and effective keyboard logger."
Also from their readme file:
"If you want KeyLog to work in hidden mode, just click the "Hide" button or press
ALT + S. To make it visible, just press ALT + S again."