Re: Network Monitoring
a lot of those keyloggers run on the machine that is being compromised, so you can check all the processes that are running and if it is a keylogger then you could possibly find the process there. Also, if it is a keylogger, it is possible that you have a backdoor program installed. Those are pretty tuff to get rid of and usually require formatting. Lets not jump to conclusions though.
As the sun sets, the earth shall prepare