nmap run on the uWebserve
[root@slam mike]# nmap -O xsmall.mycal.net
Starting nmap V. 2.3BETA6 by Fyodor (fyodor@dhp.com, www.insecure.org/nmap/)
Interesting ports on xsmall.mycal.net (208.135.55.29):
Port State Protocol Service
80 open tcp http
TCP Sequence Prediction: Class=truly random
Difficulty=9999999 (Good luck!)
No OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi).
TCP/IP fingerprint:
TSeq(Class=TR)
T1(Resp=Y%DF=N%W=FF%ACK=S++%Flags=AS%Ops=)
T2(Resp=Y%DF=N%W=FF%ACK=S%Flags=AR%Ops=)
T3(Resp=Y%DF=N%W=FF%ACK=S++%Flags=AR%Ops=)
T4(Resp=Y%DF=N%W=FF%ACK=S%Flags=AR%Ops=)
T5(Resp=Y%DF=N%W=FF%ACK=S++%Flags=AR%Ops=)
T6(Resp=Y%DF=N%W=FF%ACK=S%Flags=AR%Ops=)
T7(Resp=Y%DF=N%W=FF%ACK=S++%Flags=AR%Ops=)
PU(Resp=N)
Nmap run completed -- 1 IP address (1 host up) scanned in 76 seconds