Assignment:
The text listed several monitoring systems, other systems that defeat them, and an e-mail encryption program. Find two more of the following: Programs that monitor keyboard activity Programs that find keyboard monitoring programs E-mail encryption programs.
Your answer must be, typed, double-spaced, Times New Roman font (size 12), one-inch margins on all sides, APA format and also include references.