Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?
It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______: