You could configure nessus scanning on the server to fingerprint the OS.

http://www.cisco.com/en/US/products/ps6128/products_tech_note09186a0080545b62.shtml

Daniel Tuck
Network Administrator JNCIA - Western State College of Colorado
[EMAIL PROTECTED]
(970)943-3123


On 4/16/08 7:07 AM, "James Moskwa" <[EMAIL PROTECTED]> wrote:

Has anyone run into this yet? Any thoughts on how to neutralize it as a bypass?
http://daa1000.tripod.com/
Regards,
-- Jim

Jim Moskwa
Manager Networks & Security
Information Technology Department
Johnson & Wales University
8 Abbott Park Place
Providence, RI 02903
Office: 401-598-1556
Fax: 401-598-1329
Email: [EMAIL PROTECTED]


Reply via email to