User Agent strings are typically information about the browser connecting to the server, not necessarily the information about the server.
For example if you go to http://www.useragentstring.com/ you can find out information about your browser: it shows a breakdown of the user agent string.
Example
Here I'm using Chrome
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/27.0.1453.110 Safari/537.36
Here is an explanation of what the values in the string mean

How to learn a servers OS
I would use nmap
to do this. You'll likely have to install it but it will show you the fingerprint of a system based on how it responds to nmap's queries. Among other things, each OS responds in a unique way in terms of the time and sequence when network connections are made against them, this information has been compiled into nmap
so that it can gleam what underlying OS is at the other end.
You can use this query to find out:
$ sudo nmap -v -A <ip address>
Example
Here I'm scanning a webserver that I use for development.
$ sudo nmap -v -A homer
Starting Nmap 5.21 ( http://nmap.org ) at 2013-10-11 09:25 EDT
NSE: Loaded 36 scripts for scanning.
Initiating ARP Ping Scan at 09:25
Scanning homer (192.168.1.105) [1 port]
Completed ARP Ping Scan at 09:25, 0.15s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 09:25
Completed Parallel DNS resolution of 1 host. at 09:25, 11.04s elapsed
Initiating SYN Stealth Scan at 09:25
Scanning homer (192.168.1.105) [1000 ports]
Discovered open port 587/tcp on 192.168.1.105
Discovered open port 25/tcp on 192.168.1.105
Discovered open port 111/tcp on 192.168.1.105
...
...
Device type: general purpose
Running: Linux 2.6.X
OS details: Linux 2.6.9 - 2.6.28
Uptime guess: 10.557 days (since Mon Sep 30 20:03:59 2013)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=205 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: Host: homer.bubba.net; OS: Unix
HOP RTT ADDRESS
1 4.05 ms 192.168.1.105
Read data files from: /usr/share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 22.16 seconds
Raw packets sent: 1022 (45.726KB) | Rcvd: 1016 (41.372KB)
These lines will tell you what you want to know:
Running: Linux 2.6.X
OS details: Linux 2.6.9 - 2.6.28
Your HTTP_USER_AGENT String
So if you're using the browser included within your Samsung SmartTV and you see the following you can make the following 2 assumptions:
HTTP_USER_AGENT: Mozilla/5.0 (SMART-TV; X11; Linux i686) AppleWebKit/535.20+ (KHTML, like Gecko) Version/5.0 Safari/535.20+
- That the system is in fact a Linux system using some form of a Linux with X11 running, and a version of a browser that's based on WebKit.
- That the system's web browser is configured to spoof it's USER_AGENT string to sites that report this string back, and it's some unknown OS & Browser combination.
To find out more about this system, you'll likely need to use the method I outlined above using nmap
.