{"id":521,"date":"2003-12-06T19:59:52","date_gmt":"2003-12-07T00:59:52","guid":{"rendered":"http:\/\/blogs.terrorware.com\/geoff\/2003\/12\/06\/107075879228149895\/"},"modified":"2003-12-06T19:59:52","modified_gmt":"2003-12-07T00:59:52","slug":"107075879228149895","status":"publish","type":"post","link":"https:\/\/blogs.terrorware.com\/geoff\/2003\/12\/06\/107075879228149895\/","title":{"rendered":"107075879228149895"},"content":{"rendered":"<p><b>fighting with windows<\/b><\/p>\n<p>i spent like 3 hours last nice after <i>pretty hot<\/i> practice to try to figure out how to fix the cathy shack&#8217;s dsl.  tech support was pretty helpless, but it turned out to be a problem that had to do with the computer and not the dsl service.  the culprit &#8211; a busted tcp\/ip stack.  i found the below info really helpful:<\/p>\n<p>from <a href=\"http:\/\/www.experts-exchange.com\/Operating_Systems\/WinXP\/Q_20782223.html\">http:\/\/www.experts-exchange.com\/Operating_Systems\/WinXP\/Q_20782223.html<\/a><\/p>\n<blockquote>\n<pre>\nHow to Recover from Winsock2 corruption:\n==================================\n\nReinstall of the TCP\/IP protocol to restore Winsock functionality\n\nStep 1: Delete registry keys\n\nA) Open Regedit from the Run line\nB) Go to both of the following keys, export each of them, and then delete them: \nHKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Winsock  and\nHKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Winsock2 \nC) Restart the computer\n\nNOTE: It is important to restart the computer after deleting the Winsock keys.  \nDoing so causes the XP operating system to recreate shell entries for those two \nkeys.  If this is not done, the next step does not work correctly.\n\n\nStep 2: Install TCP\/IP on top of itself\n\nA) Open the properties window of the network connection \nB) Click Install \nC) Click Protocol, then Add\nD) Click Have Disk\nE) Type the path to the nettcpip.inf file, for example: c:\\windows\\inf, and click \nOK (if you try to click Browse, then browse to the \\inf folder, it may not show up \nin the list).\nF) You should now see \"Internet Protocol (TCP\/IP)\" in the list of available \nprotocols.  Select it and click OK.\nG) Restart the computer\n\nWhen the computer reboots you will have functional Winsock keys.\n\nNOTE: If the network connection properties contained more than the following three \nitems: Client for Microsoft Networks, File and Printer Sharing for Microsoft \nNetworks, and TCP\/IP, then the additional items may need to be removed in order to \nrestore browsing.  If those items are needed they can be reinstalled.  The reason \nfor removing them is due to those items placing entries into the Winsock keys and \nthose entries will no longer be there.\n\nSide effects and possible problems:\n\nThis method will restore basic functionality to the Winsock keys, but is not a \ncomplete rebuild. On a default install of Windows XP the registry key: \nHKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Winsock2\\ParametersProtocol_Cat\nalog9\\Catalog_Entries - will have 11 sub-keys. When applying this method, the \nCatalog_Entries will only have three sub-keys.  However, it works and there does \nnot appear to be any side effects.  The missing entries relate back to the: \nHKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters\\Interfaces \nkey.\nAlso, third-party proxy software or firewalls may need to be reinstalled.\n<\/pre>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>fighting with windows i spent like 3 hours last nice after pretty hot practice to try to figure out how to fix the cathy shack&#8217;s dsl. tech support was pretty helpless, but it turned out to be a problem that had to do with the computer and not the dsl service. the culprit &#8211; a&hellip; <a class=\"more-link\" href=\"https:\/\/blogs.terrorware.com\/geoff\/2003\/12\/06\/107075879228149895\/\">Continue reading <span class=\"screen-reader-text\">107075879228149895<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-521","post","type-post","status-publish","format-standard","hentry","category-uncategorized","entry"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4wnIz-8p","_links":{"self":[{"href":"https:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/posts\/521","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/comments?post=521"}],"version-history":[{"count":0,"href":"https:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/posts\/521\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/media?parent=521"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/categories?post=521"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/tags?post=521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}