Answer:
on the motherboard inside the computer
Answer:
Spoofing
Explanation:
Spoofing that occurs when an intruder computer fools network into believing its IP address is associated with trusted source
"Key logger" This could be software or hardware that does this.