Thank you for confirming what our local boy wonder figured told me
yesterday. I basically gave up after hearing his workaround
suggestion and the caveat.
He suggested using a different proxy:
http://ntlmaps.sourceforge.net/
He also suggested compiling it into an EXE (to speed things up?) I
got stuck on that step. I downloaded (also on his advice) IronPython,
and while I was busy figuring out how to generate an EXE out of the
Python scripts, teh guru e-mailed me the following:
"Doing some more looking around, Chrome seems to be slamming the proxy
server. It keeps trying to open a remote-winsock control channel on
port 1745 with its specified proxy server – and attempts to do so at a
rate of about two attempts per second, as long as the browser remains
open.
This is, in effect, flooding the proxy server, which probably has a
hard limit on the number of allowable open channels from a single
client machine to prevent DoS attacks. So as a result you wind up
effectively DoS’ing yourself.
The reason the Python proxy alleviates the problem is that the Chrome
client begins to slam it instead of the ISA server, and it doesn’t
proxy those remote requests across the wire to the real server.
However, the end result is that your CPU gets pegged at 100% as the
Python script struggles to keep up with the request flood.
This is just miserably poor code on Google’s part – half second
retries for a failed channel are simply beyond the pale in network
programming. Whoever did that should be kicked out on his ass and
never allowed to touch a networked system again."
That's where I got off the Chrome bandwagon.