Keyloggers come in different forms – both as covert software and as hardware devices designed to intercept and store keyboard strokes for later collection. They have been designed for legitimate purposes, such as preventing employees from entering sensitive information, but have been given a new lease of life by internet criminals. They deliver such software in trojan horse form and then use it without the victim's knowledge to steal account passwords and other information. Simon Heron of Network Box explores the various sub-categories of keylogging hard devices and software tools, and documents their installation and operating methods. He also explores techniques for retrieving information over public networks using techniques such as IRC and P2P relaying. The attractions of making money through extortion by carrying out denial of service (DoS) attacks are diminishing. The criminals who control botnets do not want to risk their network if a company calls their bluff. It takes some time and effort to create a botnet and if you are forced into launching an attack, you expose that botnet to discovery and decapitation.