Hackers can easily install keylogger programs onto a victim’s computer. These programs spy on what the user types on their keyboard. If you think that you can just uninstall such programs, you are wrong; they are completely hidden. After installation, the hacker uses a password and hotkeys to enable the keylogger. He can then use the hotkeys and password to access your key entry details.
Keylogger programs are widely available on the internet. Some of them are listed below:
For more information on keyloggers and their usage, refer to my post on hacking an email account.
Even if direct access to your computer is not possible, hackers can still install a keylogger from a remote place and access your computer using Remote Administration Tools (RATs).
Another way of getting your password is the use of fake login pages that look exactly like real ones. Beware of the web pages you visit. If you find your computer behaving oddly, there is a chance that a spy program is running. On such occasions, it is best to try and remove the malware or reformat the entire hard disk. A detailed email hacking tutorial is discussed in the post “hacking an email account.”