>I've looked at it a little bit, but many months ago. Before I
>left my previous employer, where I had access to the NG Sniffer,
>I made some small trace files,
>with 1 to 5 packets in each, and saved them as both compressed
>and uncompressed.
I was going to attack it in another way that I think might be quicker. I'll
let you know how it goes.
On a related note, I noticed that an older copy of NETXRAY that we have here
in the office has the ability to write "compressed" files too, with an
extension of .CAZ. On a hunch, I took one of these and ran it through GZIP,
and sure enough it appears to be the regular .CAP format simply Gzipped.
Another good reason to have that gzip support in Ethereal.
Perhaps this is where you got the idea? If not, it sure works out well!
=====================================
Tim Farley
Software Engineer
tfarley@xxxxxxx
Internet Security Systems, Inc.
(678) 443-6000 / Direct Dial (678) 443-6189 / fax (678) 443-6479
http://www.iss.net
Adaptive Network Security for the Enterprise
=====================================