Hi all,

I've been studying the MSNSLP/P2P protocol in detail lately and got a bit frustrated by it all, and to try and clear things up a bit I wrote a tiny app to help me study the mess. The app lets you open switchboard session dumps taken by Ethereal using its "C Arrays" dumping method ("Follow TCP Stream" -> Check "C Arrays" -> "Save As").

Screenshot:
http://jblinux.net/tmp/Screenshot-msnslpview.png

It's just a quick 'n dirty one-evening hack, so it's probably got lots of bugs, but in case anyone finds it useful I put it up here:
http://www.jblinux.net/gmessenger/msnslpview-20051120.tar.gz

Requires python and pygtk to run, haven't checked exact version dependencies (I'm running Python 2.4.2 and pygtk 2.8.2).

Ole André

Reply via email to