QUOTE (Aaron @ May 28 2008, 11:56 AM)
I was under the impression that the Stealth program makes you look innocuous, not invisible. I mean, if you're trying to access a node, and its System software doesn't think you're there, it's not going to send you anything, including what's in the node, etc., so you're basically disconnected. To use a modern example, if you have no ssh session on a box, you're not going to get jack from it, no matter how many commands you try to send it.
I've always thought the Stealth program didn't say "I'm not here," but rather "I'm a data packet, not a persona," or "Oh yeah, I'm totally supposed to be here," or "I am a hedge," or something.
I totally agree with this viewpoint on Stealth. I treat it exactly like a combination of Physical Stealth and Etiquette.
I also like to run systems that have a browse utility set to continuously scan the user list, compare it to the employee access list, and report to the spider and the spider usually has to complete a dump/scan of the datalogs every period of time (1 hour for crappy security, 1 minute for high end security). Program detects n+1 admin accounts when there are only supposed to be n accounts according to HR? Alert. Log on as an inactive admin, the spider gets to make a memory test to see if he remembers that that guy isn't working right now (and follow up according to procedures).
None of this applies of course to the original Exploit attempt. That one you get for free in interest of keeping the game fun.