This may not be the best approach, since they have legitimate access to the systems in question. See A practical approach for defeating Nmap OS-Fingerprinting.
In reply to Re^2: Remote OS Detection
by marto
in thread Remote OS Detection
by pankaj_it09
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |