seems like this...
even nmap discovers Linux:
[root@beta ~]# nmap -vv -p119 -P0 -sT -O betanews.microsoft.com
Starting nmap V. 2.12 by Fyodor (fyodor@dhp.com, www.insecure.org/nmap/)
Initiating TCP connect() scan against (207.46.180.35)
Adding TCP port 119 (state Open).
The TCP connect scan took 0 seconds to scan 1 ports.
For OSScan assuming that port 119 is open and port 39720 is closed and neither a
re firewalled
Interesting ports on (207.46.180.35):
Port State Protocol Service
119 open tcp nntp
TCP Sequence Prediction: Class=random positive increments
Difficulty=3819176 (Good luck!)
Sequence numbers: E6E23C4C E7368B4F E6E0CC8D E79B4DEC E7A43C4E E76D208A
Remote operating system guess: Linux 2.1.122 - 2.1.132; 2.2.0-pre1 - 2.2.2
OS Fingerprint:
TSeq(Class=RI%gcd=1%SI=3A46A8)
T1(Resp=Y%DF=Y%W=7F53%ACK=S++%Flags=AS%Ops=MENNTNW)
T2(Resp=N)
T3(Resp=Y%DF=Y%W=7F53%ACK=S++%Flags=AS%Ops=MENNTNW)
T4(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=)
T5(Resp=N)
T6(Resp=N)
T7(Resp=N)
PU(Resp=N)
Nmap run completed -- 1 IP address (1 host up) scanned in 20 seconds
-- Markus Doehr IT Admin AUBI Baubeschläge GmbH Tel.: +49 6503 917 152 Fax : +49 6503 917 190 e-Mail: doehrm@aubi.de MD1139-RIPE *************************- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/