Blog Cybersecurity Fingerprinting Techniques and OS-Network Fingerprint Tools