"The Trojan horse was set up to monitor keystrokes in order to steal passwords, bank account numbers and other important information." . . . . .