They are programs installed on a computer in order to harvest user IDs and passwords. The programs collect this information and secretly transmit it to another computer, and someone can then attempt to login to your account. The programs are called Trojans (short for Trojan Horse) or Key Loggers (for logging your keystrokes).