<P> Keystroke logging (often called keylogging) is a method of capturing and recording user keystrokes . While it is used legally to measure employee productivity on certain clerical tasks, or by law enforcement agencies to find out about illegal activities, it is also used by hackers for various illegal or malicious acts . Hackers use keyloggers as a means to obtain passwords or encryption keys and thus bypass other security measures . </P> <P> Keystroke logging can be achieved by both hardware and software means . Hardware key loggers are attached to the keyboard cable or installed inside standard keyboards . Software keyloggers work on the target computer's operating system and gain unauthorized access to the hardware, hook into the keyboard with functions provided by the OS, or use remote access software to transmit recorded data out of the target computer to a remote location . Some hackers also use wireless keylogger sniffers to collect packets of data being transferred from a wireless keyboard and its receiver, and then they crack the encryption key being used to secure wireless communications between the two devices . </P> <P> Anti-spyware applications are able to detect many keyloggers and cleanse them . Responsible vendors of monitoring software support detection by anti-spyware programs, thus preventing abuse of the software . Enabling a firewall does not stop keyloggers per se, but can possibly prevent transmission of the logged material over the net if properly configured . Network monitors (also known as reverse - firewalls) can be used to alert the user whenever an application attempts to make a network connection . This gives the user the chance to prevent the keylogger from "phoning home" with his or her typed information . Automatic form - filling programs can prevent keylogging entirely by not using the keyboard at all . Most keyloggers can be fooled by alternating between typing the login credentials and typing characters somewhere else in the focus window . </P> <P> Keyboards are also known to emit electromagnetic signatures that can be detected using special spying equipment to reconstruct the keys pressed on the keyboard . Neal O'Farrell, executive director of the Identity Theft Council, revealed to InformationWeek that "More than 25 years ago, a couple of former spooks showed me how they could capture a user's ATM PIN, from a van parked across the street, simply by capturing and decoding the electromagnetic signals generated by every keystroke," O'Farrell said . "They could even capture keystrokes from computers in nearby offices, but the technology wasn't sophisticated enough to focus in on any specific computer ." </P>

List the purpose of each button on the top or bottom of the keyboard