Theoretically, scanning a network should be benign. Probing workstations and servers shouldn’t interrupt the normal functionality of those systems. In practice, however, this may not be the case. Many ...