Some security tools have been developed to fake Nmap in its OS Fingerprinting
purpose. This paper describes different solutions to defeat Nmap and behave
like another chosen operating system, as well as a demonstration on how can
This document is a pdf file. To view it click here.