We help IT Professionals succeed at work.

How to get 'rid' of this constant broadcast message my laptop keeps doing ...

pugdog_fan
pugdog_fan asked
on
Medium Priority
614 Views
Last Modified: 2012-05-06
I have attached a wireshark .JPG to this question, so you can see exactly what I'm talking about.

It is hard to describe the problem, but I'll try ...

For about 2 weeks last year, I was contracting at a site as a daily IT helper ...
The netBIOS name of each PC on site was something like this:

AL-20-Win2K
AL-18-WinXP

The AL was the company name ... the number is the location of the PC ... and the last part is the OS on the system.

Since that time ... I always see these DARN broadcast messages from my laptop when I do any Wireshark work (I've cleared my DNS cache dozens of times ... I'm using DHCP 99.99% of the time, and I've check all the TABS for network configuration (even the advance TABS ... etc.)

I simply cannot find 'where' on my laptop this reference to the old company is located at.

I hope this make sense.

I have not been back to the site where this started at in nearly 6 months ...

I have no idea why, how, or where this is 'stuck' in my networking configuration process.


screen.jpg
Comment
Watch Question

Commented:
Could be something left over in my network places
SteveNetwork Manager

Commented:
go to a cmd prompt and do a 'net use' and see if anything is still registered for the old network..

it looks like a DNS name query on an old share that hasnt been removed..
I captured a few minutes and I got those broadcasts about an computer in my network.
I searched for that name in my registry and I found that name under my Antivirus directory.

Try to search your registry entries and see if that computer name appears somewhere. Maybe you will find something that you can erase.

Not the solution you were looking for? Getting a personalized solution is easy.

Ask the Experts

Author

Commented:
ionut mir:

Good suggestion ... I did exactly what you said, and I found three entries in my Windows XP registry files for that NBMS 'name'.  I removed the entries ... rebooted my PC ... and I've run Wireshark a bunch of times.  They are GONE.

I get different NBMS broadcasts now (they don't bother me because they look like 'normal' stuff for announcements and browser election related ...).

I'll close this question in a bit ... and award you the points, but I wanted to put in another screen shot of a capture I got to see if anyone has any pointers on it ...

Author

Commented:
After getting the NBNS stuff to 'stop' showing 'false' stuff ... I rebooted my PC (to get my Windows registry to reload fresh).  I kept the CAT-5e Ethernet cable out of the NIC card, so I could get control of my desktop 1st (to relaunch Wireshark with a clean capture).

When I that, I noticed some 'incoming' Internet traffic from Microsoft that I'm not sure why/how my PC would have 'asked' or generated it.

NOTE:  The picture below is like after the 2nd or 3rd reboot and Wireshark capture.  It might show my PC 1st 'asking' for traffic from the 65.x.x.x network ... but in the earlier captures ... the 65.x.x.x network traffic came in without my launching any Internet stuff (so maybe something in the registry is asking Microsoft for information)????

Can you tell what the traffic in this picture is about?


screen1.jpg
If you paste that IP in Internet explorer... and if you have connection to internet it will go to update.microsoft.com, so I hope this will answer your question :).
Access more of Experts Exchange with a free account
Thanks for using Experts Exchange.

Create a free account to continue.

Limited access with a free account allows you to:

  • View three pieces of content (articles, solutions, posts, and videos)
  • Ask the experts questions (counted toward content limit)
  • Customize your dashboard and profile

*This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

OR

Please enter a first name

Please enter a last name

8+ characters (letters, numbers, and a symbol)

By clicking, you agree to the Terms of Use and Privacy Policy.