Thanks for the explanation. I was under the impression that your IP address, open ports, CLSIDs, etc., wouldn't change when you re-installed the image, and the machine would therefore look identical to anyone building a zombie database. If you're running nekkid, then getting the actual exploit onto your machine isn't the difficult part, right?
You are correct about that (ports, etc.) being a downside to the nekkid approach. Once they found you again (speeded by keeping the same settings) you'd be targetted again. The whole nekkid idea is that you don't care whether or not you're hit, since you'll just reimage soon anyway.
I don't agree with that idea, BTW.