To enhance our website and services, we use Google Analytics, which requires your consent below to gather data about your device and site usage. Your data may be transferred outside the EU by Google, where regulations may differ. Consent is voluntary and revocable by contacting us.
Essential cookies are strictly necessary for site operation. For details on cookie usage as well as how we process your data, please read our policy.
These products are designed to guestimate remote operating systems, their patch level, services and sometimes even vulnerabilities. Passive fingerprinting tools analyse communications to and from a remote host whilst it goes about it's normal business. Some Network IDS now have this capability and are referred to as Target IDS where the fingerprinting information is used to prioritise IDS alerts based upon the targets potential vulnerability to the detected attack.