International Journal of Computer Science and Mobile Computing (IJCSMC)
All companies systematically monitor the computers, internet, or emails use of its user's employees. There are over hundred's different products available today that will let organizations see what their users do at work on their "Personal" computers, in their email, and on the internet. The espionage & monitoring system program logs all keystroke logging along with the name of the application in which the keystrokes were entered. Using espionage & monitoring system, the authors prevent the miscellaneous use of system. Using this they capture all information in text and image form.