Hacker News new | past | comments | ask | show | jobs | submit login

Some of the fingerprints are easily gotten around by fudging the binaries a bit. Others, like snort rules, look at things like network traffic that might not always be so easily disguised.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: