Stealth (Program)
Stealth (Continuous)
Default: Computer Hacking-3 or Expert (Computer Security)-3.
Base Complexity: 4.
Mask a user, program, computer, or data object from Analyze, Listen, and Search.
While running, Stealth (Program) resists any attempt to find or examine the cloaked object – such programs must win a Quick Contest with Stealth (Program) in order to get any information at all. Of course, to many sysadmins, inconclusive results on an Analyze attempt are cause for further investigation . . .
This is one of the Hacking Programs.
skill_defaults:: "Computer Hacking-3 or Expert (Computer Security)-3"
complexity:: 4