QUOTE (RunnerPaul @ Jun 26 2008, 07:19 PM)

With regards to the Access Log, Unwired suggests that this is fairly standard for hackers: "A good hacker will always perform a Data Search through the file and then an Edit to remove any trace of her presence." Makes sense, since if you leave any entries in the Access Log, they can run a Trace on you after the fact.
However "For all Matrix actions performed in a node, records are created." So you perform your data search, and you perform your edit, removing any entries for ID1138, but then as you complete those actions, two new entries get appended to the log:
26JUN2071-19:03:38>ID1138 performed data search on file access.log
26JUN2071-19:03:41>ID1138 performed edit on file access.log
Well, in the real world this is kind of the case. It's not uncommon for the act of editing logs to be more noticeable than whatever act was recorded by the logs. I've got friends who do computer forensics for a Fortune 100 and more than a few people were caught when their attempts to clean a log triggered an alert. In a busy network, a period with no logs is more glaring an issue than hinky activity.
If you've acquired an actual user account, it's pretty easy since you just need to edit the log entries where you accessed the paydata to something the user account normally touches. As long as you stay in the user-account's normal activity zone, it's very hard to detect.
The thing to remember is that if you don't trigger an alert, the data log must not be weird enough to be an obvious issue. I mean, if the logs really said "01:13 - User:IStealYourStuff File_Read:Paydata.PDF (Permission Restrictions Ignored)" don't you think the node's ICE would kick in immediately?
Your Stealth will ensure the logs say something like "01:13 - Service:AVClient File_Read:Paydata.PDF." Of course, that still shows that Paydata.PDF was accessed. If someone later does a breakdown on every time Paydata.PDF was accessed, they might find something you did in that timeframe that leads back to your IP address so you'll want to change that log to "01:13 - User:AVClient File_Read:TimmysXmasList.txt". Then the worst that they'll find is the logs show "01:14 - User:AVClient File_Edit:System.log".
That is something of a fingerprint but it's sufficiently low-key that it would require a later investigation with more processing power than the node's active defenses to detect your activities. Really, the biggest risk to a hacker who gets in and out without an alert is that some
other hacker will trigger an alert in the next couple of days causing all the logs to be audited.