[EMAIL PROTECTED] writes:

>   Reverse engineering network protocols has, historically, been rather easy
> to do.  I was, in fact, somewhat surprised to not find an instance of a
> "ripper" for RealNetworks's RDT protocol already in existence.

I seem to recall something that did this (on Windows) a couple years back;
then they dropped the code after Real's lawyers threatened them. Offhand,
I don't recall the name of the tool. There was no source code distributed, 
so nobody else could keep it alive.


-- 
John Abreau / Executive Director, Boston Linux & Unix 
ICQ 28611923 / AIM abreauj / JABBER [EMAIL PROTECTED] / YAHOO abreauj
Email [EMAIL PROTECTED] / WWW http://www.abreau.net / PGP-Key-ID 0xD5C7B5D9
PGP-Key-Fingerprint 72 FB 39 4F 3C 3B D6 5B E0 C8 5A 6E F1 2C BE 99

"An idealist is just a farsighted pragmatist."  -Anon


Attachment: msg15693/pgp00000.pgp
Description: PGP signature

Reply via email to