{"id":74,"date":"2008-06-29T03:47:12","date_gmt":"2008-06-29T07:47:12","guid":{"rendered":"http:\/\/www.cchsu.com\/art-en\/?p=74"},"modified":"2008-06-29T03:47:12","modified_gmt":"2008-06-29T07:47:12","slug":"troubleshooting-network-connectivity-5","status":"publish","type":"post","link":"https:\/\/www.cchsu.com\/art-en\/2008\/06\/29\/74\/","title":{"rendered":"Troubleshooting Network Connectivity (5)"},"content":{"rendered":"<p>Different applications have different troubles with connectivity.\u00a0\u00a0In the following I&#8217;m\u00a0going to list some common causes.\u00a0 One top item in the field is LSP.\u00a0 LSP is provided by Winsock as a linked service provider.\u00a0 In Vista, this thing won&#8217;t be a serious\u00a0issue\u00a0as before\u00a0since Vista poses more limitation\/restrictions which makes LSP not quite &#8220;useful&#8221; as their XP counterparts.\u00a0 One can use &#8220;netsh winsock show catalog&#8221; to inspect how many LSP providers are installed, and what protocols are they working on.\u00a0 You can google a bit and find a bunch of nice LSP fixers to deal with LSP problems if you have any.\u00a0 Newer security suites should all have the capability to deal with LSP layer infections.<\/p>\n<p>The other common problem is the conflict among security softwares.\u00a0 Modern security softwares install kernel-level drivers and work directly inside network stack so that they can provide full protections.\u00a0 Unfortunately, none of them are designed to work with security software from their competitors.\u00a0 As a result, if you want to secure computer but not screw it, install one suite of security software.\u00a0 People tell you things like &#8220;hey, BLAHBLAH\u00a0is a nice add-on for\u00a0WALAWALA and can further secure the computer&#8221;.\u00a0 My translation for that is &#8220;I can make more money from you if you bought two instead of one&#8221;.<\/p>\n<p>Most security software that did content scanning uses techniques named &#8220;proxy&#8221;, which means redirecting your network traffic to some program,\u00a0holding the connection contents, and then\u00a0performing scans.\u00a0 For example, anti-spam software monitors network connections\u00a0between your computer and\u00a0the mail servers,\u00a0holds your mails first, scans them, and decides which folders should these mails go to your Outlook.\u00a0 If the holding\/scanning part is dead but redirecting part is still working, then you&#8217;ll have nothing displayed in your program.\u00a0 Typically a reboot can fix these issues.\u00a0\u00a0For anti-spam softwares, if a reboot does not fix the problem, that typically implies the software can not handle\u00a0certain e-mails in your mail box (either too large, failed to parse, or some other reason).\u00a0 You might want to temporarily disable it, pull down all your e-mails, and then turn it back on.<\/p>\n<p>The last and most frustrating reason is malware.\u00a0 Malware\u00a0plays important roles in\u00a0certain huge and profitable businesses.\u00a0 For example, on-line advertisement firms want to send out advertisement e-mails (yeah, spams for most people).\u00a0 However, they don&#8217;t want to pay for the internet bandwidth, at least not paying in full.\u00a0 How can they do that?\u00a0 Writing a malware, try to infect your computer, and use your internet connections to help them send out e-mails silently.\u00a0 Although most malwares today attempt to stay in your computer forever, they do not work well together with each other (fortunately).\u00a0 As a result, if your computer is heavily infected, it&#8217;s very likely these malwares are fighting each other to take over controls of your network, which renders your machine useless.\u00a0 So here are your options<\/p>\n<ul>\n<li>Install a security suite to clean your machine up<\/li>\n<li>Ghost back your whole machine and try not to get infected<\/li>\n<li>Write your lawmakers to push for laws to put these malware authors in jail (Believe it or not, it is legal in most countries to write malwares and sell them to others if you&#8217;re not distributing them yourself.)<\/li>\n<\/ul>\n<p>BTW, make sure the application that you use does not have serious bugs themselves, especially when you update to a newer version \ud83d\ude42<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Different applications have different troubles with connectivity.\u00a0\u00a0In the following I&#8217;m\u00a0going to list some common causes.\u00a0 One top item in the field is LSP.\u00a0 LSP is provided by Winsock as a linked service provider.\u00a0 In Vista, this thing won&#8217;t be a serious\u00a0issue\u00a0as before\u00a0since Vista poses more limitation\/restrictions which makes LSP not quite &#8220;useful&#8221; as their XP [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,5,6],"tags":[],"_links":{"self":[{"href":"https:\/\/www.cchsu.com\/art-en\/wp-json\/wp\/v2\/posts\/74"}],"collection":[{"href":"https:\/\/www.cchsu.com\/art-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cchsu.com\/art-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cchsu.com\/art-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cchsu.com\/art-en\/wp-json\/wp\/v2\/comments?post=74"}],"version-history":[{"count":0,"href":"https:\/\/www.cchsu.com\/art-en\/wp-json\/wp\/v2\/posts\/74\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cchsu.com\/art-en\/wp-json\/wp\/v2\/media?parent=74"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cchsu.com\/art-en\/wp-json\/wp\/v2\/categories?post=74"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cchsu.com\/art-en\/wp-json\/wp\/v2\/tags?post=74"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}