Hack Tracer will make your computer 'stealthed.' Any attempts at pinging or port scanning will receive no response. Unsolicited UDP packets and TCP connections will not get through. In short, the computer cannot be detected from outside. Hack Tracer introduces a feature that lets you geographically trace hack attempts. Hack Tracer will bring up a map and trace the route from your computer through every step back to the hacker's computer. The program also allows you the option to upload the data from a hack attempt to Sharp Technologies security center for study, investigation, and product improvement.