This document discusses stealthy port scans conducted by hackers. It notes that networks allow data packet exchange between servers and clients using their ports, which are identified by port IDs. Hackers use port scanning software to interrupt packet exchange, with two main purposes: to get information on the status of IP addresses, and to flood intrusion detection alerts to distract the network. The document proposes a system where the administrator can control the network and limit access to prevent hackers from sharing all resources, with clients only able to use granted limited resources. It outlines modules for network manipulation, protection, connection finding and displaying/hiding resources.