 Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording logging the keystroke on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program. The keylogger can be either software or hardware. While the programs themselves are legal, with many of them being designed to allow employers to oversee the use of their computers, keyloggers are most often used for the purpose of stealing passwords and other confidential information. Keylogging can also be used to study human-computer interaction. Numerous keylogging methods exist, they range from hardware and software-based approaches to acoustic analysis. These are computer programs designed to work on the target computer's software. Keyloggers are used in IT organizations to troubleshoot technical problems with computers and business networks. Families and business people use keyloggers legally to monitor network usage without their users' direct knowledge. Even Microsoft publicly admitted that Windows 10 operation system has a built-in keylogger in its final version to improve typing and writing services. However, malicious individuals can use keyloggers on public computers to steal passwords or credit card information. Most keyloggers are not stopped by HTTPS encryption because that only protects data in transit between computers, thus the threat being from the user's computer.