Thank you for confirming what our local boy wonder figured told me yesterday. I basically gave up after hearing his workaround suggestion and the caveat.
He suggested using a different proxy: http://ntlmaps.sourceforge.net/ He also suggested compiling it into an EXE (to speed things up?) I got stuck on that step. I downloaded (also on his advice) IronPython, and while I was busy figuring out how to generate an EXE out of the Python scripts, teh guru e-mailed me the following: "Doing some more looking around, Chrome seems to be slamming the proxy server. It keeps trying to open a remote-winsock control channel on port 1745 with its specified proxy server – and attempts to do so at a rate of about two attempts per second, as long as the browser remains open. This is, in effect, flooding the proxy server, which probably has a hard limit on the number of allowable open channels from a single client machine to prevent DoS attacks. So as a result you wind up effectively DoS’ing yourself. The reason the Python proxy alleviates the problem is that the Chrome client begins to slam it instead of the ISA server, and it doesn’t proxy those remote requests across the wire to the real server. However, the end result is that your CPU gets pegged at 100% as the Python script struggles to keep up with the request flood. This is just miserably poor code on Google’s part – half second retries for a failed channel are simply beyond the pale in network programming. Whoever did that should be kicked out on his ass and never allowed to touch a networked system again." That's where I got off the Chrome bandwagon. --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "The Java Posse" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [EMAIL PROTECTED] For more options, visit this group at http://groups.google.com/group/javaposse?hl=en -~----------~----~----~----~------~----~------~--~---
