I found this on MS's website
http://www.microsoft.com/downloads/deta ... laylang=en
Maybe we could put a team together and make a cool, but simple P2P program.
How about a PB project? P2P ?
How about a PB project? P2P ?
I Stepped On A Cornflake!!! Now I'm A Cereal Killer!
dunno, base a p2p thing on a microsoft product is somehow worrying...
( PB6.00 LTS Win11 x64 Asrock AB350 Pro4 Ryzen 5 3600 32GB GTX1060 6GB - upgrade incoming...)
( The path to enlightenment and the PureBasic Survival Guide right here... )
( The path to enlightenment and the PureBasic Survival Guide right here... )
Especially with SP2 for XP out and totally screwing up the whole P2P model with it's connection limiting.
-Mitchell
Check out kBilling for all your billing software needs!
http://www.k-billing.com
Code Signing / Authenticode Certificates (Get rid of those Unknown Publisher warnings!)
http://codesigning.ksoftware.net
Check out kBilling for all your billing software needs!
http://www.k-billing.com
Code Signing / Authenticode Certificates (Get rid of those Unknown Publisher warnings!)
http://codesigning.ksoftware.net
connection limiting? please explain...
(to be honest, a p2p project is quite interesting to me, i've been toying around for some time with some ideas)
(to be honest, a p2p project is quite interesting to me, i've been toying around for some time with some ideas)
( PB6.00 LTS Win11 x64 Asrock AB350 Pro4 Ryzen 5 3600 32GB GTX1060 6GB - upgrade incoming...)
( The path to enlightenment and the PureBasic Survival Guide right here... )
( The path to enlightenment and the PureBasic Survival Guide right here... )
@Karbon
There is a limit of 10 _incomplete_ connections only.
So as long as the remote hosts are alive and respond, you can do as much as you want of connections, so no real pb for P2P.
When such pb occurs, it will just delay temporarly your new connections attempt. I didn't notice any slowdown at all while testing.
This new security feature is for limiting infections from worms which are connecting to many IP per second, which is viewable by a lot of pending incomplete connections.
I don't say that limiting the number of incomplete connections has not effect at all on P2P, I just say that it is almost negligible, and that a lot of people on the P2P forum just think that there is a limit of 10 _complete_ connections which is not the same thing
Anyway I have seen somewhere a patch for tcpip.sys but I won't use "that", I won't modify my OS to be imcompatible with the next updates.
EDIT :
from M$:
There is a limit of 10 _incomplete_ connections only.
So as long as the remote hosts are alive and respond, you can do as much as you want of connections, so no real pb for P2P.
When such pb occurs, it will just delay temporarly your new connections attempt. I didn't notice any slowdown at all while testing.
This new security feature is for limiting infections from worms which are connecting to many IP per second, which is viewable by a lot of pending incomplete connections.
I don't say that limiting the number of incomplete connections has not effect at all on P2P, I just say that it is almost negligible, and that a lot of people on the P2P forum just think that there is a limit of 10 _complete_ connections which is not the same thing
Anyway I have seen somewhere a patch for tcpip.sys but I won't use "that", I won't modify my OS to be imcompatible with the next updates.
EDIT :
from M$:
Limited number of simultaneous incomplete outbound TCP connection attempts
Detailed description
The TCP/IP stack now limits the number of simultaneous incomplete outbound TCP connection attempts. After the limit has been reached, subsequent connection attempts are put in a queue and will be resolved at a fixed rate. Under normal operation, when applications are connecting to available hosts at valid IP addresses, no connection rate-limiting will occur. When it does occur, a new event, with ID 4226, appears in the system’s event log.
Why is this change important? What threats does it help mitigate?
This change helps to limit the speed at which malicious programs, such as viruses and worms, spread to uninfected computers. Malicious programs often attempt to reach uninfected computers by opening simultaneous connections to random IP addresses. Most of these random addresses result in a failed connection, so a burst of such activity on a computer is a signal that it may have been infected by a malicious program.
- Registered PB user -
Using PB 4.00
Using PB 4.00
hmmm... does this limit also apply when the sp2 firewall is turned OFF ?
( PB6.00 LTS Win11 x64 Asrock AB350 Pro4 Ryzen 5 3600 32GB GTX1060 6GB - upgrade incoming...)
( The path to enlightenment and the PureBasic Survival Guide right here... )
( The path to enlightenment and the PureBasic Survival Guide right here... )


