In the past, portscanning was considered an art. Nowadays with tools like this, everybody can use the gory and obscure options of Nmap. Like the documentation mentions:

For the you script kiddies and MCSEs, nmapfe now has much more extensive tooltips built in, allowing you to more easily use it without actually understanding what you are doing.

Get it here: [NmapFE for OSX][1]

They even have a scriptkiddie output (rotfl):
StArt|ng nMap 3.70 ( http://www.iN$3Cure.0rg/nmap/ ) at 2004-09-06 19:07 C3sT
WArning: 0s d3tection WiLl be mUCH l3Sz rEl1Abl3 b3caUS3 w3 d|d not finD at l3a$t 1 OP3n And 1 cl0SeD tCP p0rt
1n$uff1c13nt Re$pon$3z f0r TCP s3QuencIng (2), 0z D3t3ct!On maY be lesz accuRate
!nter3$tIng p0rts on (xx.xx.xx.xx):
(Th3 1658 portz Scann3d bUt noT $h0wn bElow are in $TaTE: F|lTErEd)
P0rT ST4TE $3RVICe V3RS|on
22/TCP OP3n $Sh 0PeN$Sh 3.6.1p2 (prOt0cOl 1.99)
80/Tcp OpEn http 4Pach3 hTtpd 2.0.48 ((Fed0rA))
Dev1cE typ3: g3n3ral PuRpo$3
RunninG: L|nux 2.4.X
0z d3Tails: L1nUX 2.4.6 - 2.4.21, lInux 2.4.19 - 2.4.20, L|nuX 2.4.21 (X86)
Upt!m3 126.386 daYz (since M0n may 3 09:53:49 2004)</p>

nmap rUn c0mpl3tED -- 1 1P adDrE$z (1 h0$t up) $canned in 77.554 s3c0nds
` [1]: