https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5069
--- Comment #6 from Chris Maynard <christopher.maynard@xxxxxxxxx> 2010-08-04 13:24:17 PDT ---
(In reply to comment #2)
> > I can post the capture file if needed.
>
> Please (Thanks).
The file, bigwiresharkdownload.pcap, can be downloaded from our corporate FTP
site:
ftp.gtech.com
Username: wireshark
Password: 987$Mveetx!
File Size: 104,858,302 bytes
Digests:
MD5: 74966615A607A6160B97B10760FD8573
SHA-1: 0B7A4EACB7C630BE91879E3D02BE7E6AFEAE4982
SHA-256: 452752937F11861BADBF3B1DFB4273420BA108EAB82B64775857B7E724D542EC
Unfortunately, the file will only be available for ftp download for a limited
time. I have asked for it to be made available for a week, so until next
Wednesday, August 11. Hopefully that is enough time? Let me know if it's not
and I will ask for it to be made available for longer. Thanks.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.