Stealth (Program)

#hacking #Rules

Stealth (Continuous)
Default: Computer Hacking-3 or Expert (Computer Security)-3.
Base Complexity: 4.

Mask a user, program, computer, or data object from Analyze, Listen, and Search.

While running, Stealth (Program) resists any attempt to find or examine the cloaked object – such programs must win a Quick Contest with Stealth (Program) in order to get any information at all. Of course, to many sysadmins, inconclusive results on an Analyze attempt are cause for further investigation . . .

This is one of the Hacking Programs.

skill_defaults:: "Computer Hacking-3 or Expert (Computer Security)-3"
complexity:: 4