How does a trojan horse work?? I am looking to get something to place on my friends computer b/c I think he is sleeping with my girl friend and I want to catch them. I have herd you can monitor someone computer with this, is that right or what would I need???