I love stealth hacks, they are pretty good for a alternative way to hack, but, you need to be quick as light, because on stealth mode, you don't have seconds, instead, you have a "visibility bar" where, it needs to fill to detect you and the network starts defending, also, the amount of "time" you have is 3 min. ( 20 visibility per second, because the network has that automatic stealth detection and getting a total of 3600 visibility to detect you) for example: a level 1 Access takes 1 second for install, and has a visibility of 162 per second, so: 162 + 20 = 182 visibility for installing a single Access, but, everything changes when you installed the Access near a Scanner
( that freaking node ) because, the scanner makes you to be more detectable, in a more faster way, a level 1 scanner has 120% sensitivity, and a single Access installing in a node near a scanner (max. 3 nodes away from the scanner) meaning that the scanner will add the 20% of the total Access visibility, leading to this: 162/100 * 20 = 32 (this is how I calculate percentage) and by that: 162 + 32 + 20 = 216 total visibility, or in more extreme cases: a scanner level 21 deals a sensitivity of 520% and by that: 162/100 * 420 = 680, and: 162 + 680 + 20 = 862 total visibility, to much for a single level 1 Access but with a Level 21 is this: 42/100 * 420 = 176, and: 42 + 176 + 20 = 238, still very much but, worth it... I know, I have a LOT of free time, this is why I didn't bother doing this
Anyway, stealth hacking is pretty mind cracking by the fact that you need to be as fast as possible, also, you need to plan a attack before stealth-hacking, for this, calculate the nuumber of nodes that are between the node(s) that you want to hack or get its resources and the nearest NetConnection, and by doing this, count the amount of lines that are between these two factors, example: NetConnection > Compiler > Sentry > ( Turret / Turret ) > Core [ I don't know if I explained good but, the first node ( left > right ) is the left node in relation from the last node and the second one, is the right node ] OK, so, in this case, we need 4 access and around 3 data leeches... Please tell me this managed to help you out
And finally, I recommend you to develop either the wraith or if you have enough B-coins, develop a level 2 Access
( 156 visibility per second ) before you reach players around level 15 - 20, because here is where the code gates appear more frequently and the scanners are more much leveled ( i.e. my scanner is level 5, with a 160% sensitivity and is upgrading to level 6, 180% sensitivity ) and you will need the wraith, otherwise, you may not be able to bypass a network security... I hope this served for something
All of this info was get from: http://hackersthegame.wikia.com/wiki/Hackers_Wikia
And by me ( the mathematics and calculations were made by me ) again, hope this was useful!!