Vlado Had wrote: > hi, could somebody help me, how can i change > osfingerprint in packets? > thanks Do some homework. Basically a scanner uses inherent flaws in a packet response to determine the destination machine, but it could also use the fingerprint of the services running on the PC. Ex. if I implement 100% faking on the networking part of my stealthing, but leave apache open, the apache could say Redhat Linux blahblahblah and give it all away to the hacker. It isn't just 'change TOS to random', or MSS to y, or block all n packets to port q. Those are some OS fingerprint examples, but the technique is a lot more detailed. If in doubt, tear open the nmap code!