The big lie of computer security is that security improves by imposing complex passwords on users. In real life, people write down anything they can't remember. Security is increased by designing for the way humans actually behave. -Jakob Nielsen
HTS costs up to $300 a month to operate. We need your help!
Ummm...well it really depends on the system...If u have any attack vectors, like Intranet's or stuff, would be handy...Otherwise run a port scan on the network find out which servers are doing what...and map it out...Once u know how shit works, i'd try to edit a file...Might take some reconning though, and maybe even some social engineering, but it can be done..
Also what machines does ure school run?
Unless you're on another person's network (cyber cafe, wireless) you can't clean your tracks, because the ISP between u and the internet have logs (if the people are willing to get them, FBI etc).
But for low-priority hacks, u can set up a platform that makes it harder.
If you were hacking a gibson however, ISP transparent logs will probably be checked, so it's always nice to go through a shell.
Than net in a few proxies, maybe even go to a internet cafe, could even walk into an office, with a briefcase and laptop in a suit and find a empty office to sit down in, be creative i guess.
More efficiently though, i prefer to recon first, through a half-decent platform, and than once i want to make a move, use someone else's internet (piggy-bank).