In this white paper, we examine the technologies that make stealth possible on the Microsoft® Windows platform. After a brief explanation of the basic security architecture of Windows, we explore the many methods that have been discovered for hiding files, processes, and registry keys.