Sure he (the hacker) can :D depends on the kind of access he gains. You can intercept and replicate remotely any key sequence you want (not to mention that all remote control software can do that, but if you ever played with trojans you would know :P). So no - that's not the reason.