software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive
software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive