by ailurophobe » 06 Dec 2010 17:16
Why? Some (badly written) security software (SS) does (or did anyway) work by setting itself as a "proxy" between applications and the actual sockets, so the application would get its sockets from the SS and the SS would handle the actual Windows sockets. When something went wrong the application would try to get back its port but it would still be reserved since the SS failed to release it when the application lost it. Or thought it lost it when actually the SS was incompatible. Not saying that is the case here, but curious of how you can exclude it flat out.