Inputlog is one of the most used keyloggers.
Network monitors (also known as reverse-firewalls) can be used to alert the user whenever an application attempts to make a network connection.
logging | Logging | Underwater logging | slash (logging) | Keystroke logging | keystroke logging | illegal logging | Density logging | Cut-to-length logging | call logging |
Such means include wiretapping, phishing, keystroke logging, social engineering, dumpster diving, shoulder surfing, side-channel attacks, and software vulnerabilities.