[EMAIL PROTECTED] writes: > Reverse engineering network protocols has, historically, been rather easy > to do. I was, in fact, somewhat surprised to not find an instance of a > "ripper" for RealNetworks's RDT protocol already in existence.
I seem to recall something that did this (on Windows) a couple years back; then they dropped the code after Real's lawyers threatened them. Offhand, I don't recall the name of the tool. There was no source code distributed, so nobody else could keep it alive. -- John Abreau / Executive Director, Boston Linux & Unix ICQ 28611923 / AIM abreauj / JABBER [EMAIL PROTECTED] / YAHOO abreauj Email [EMAIL PROTECTED] / WWW http://www.abreau.net / PGP-Key-ID 0xD5C7B5D9 PGP-Key-Fingerprint 72 FB 39 4F 3C 3B D6 5B E0 C8 5A 6E F1 2C BE 99 "An idealist is just a farsighted pragmatist." -Anon
msg15693/pgp00000.pgp
Description: PGP signature
