RE: Scanning the Internet for Vulnerabilities