This is tutorial #03 on how hackers break into windows, Linux, android, iPhone and websites to steal information and in this tutorial I will show you how the key logger we built in tutorial #02 works and show the relevance of each script we used to come up with the key logger.