Hey gyus,
let me explain what are you doing.
1) adding the port 5400 and unchecking the box: Ignore localhost communication means that Web Shield will be trying to monitor connections to the port 5400 (where the slipstream app is running) and this monitoring will take place even if the slipstream program is running on the same computer as your browser. This seems like a good solution for this specific configuration. It would go like this:
IE <- localhost 5400 <- gets catched by webshield, scanned <- slipstream running on localhost:5400 <- compressed <- slipstream server <- HTTP server
2) adding the Slipaccel.exe to the OptinProcess= in [WebScanner] section in avast4.ini instructs Web Shield to scan all outgoing connection from the application. Outgoing connections to the specified ports will be checked, in this situation perhaps 80 and 5400. Hmm, what we are trying to do here: we have some app, the Slipstream accelerator and this possibly compresses our data, after the data are compressed or before they are uncompressed the communication should be catched by Web Shield and scanned for viruses!!!! Hmmm, this does not seem like anything that might possibly work and believe me, it is not as easy as it might seem to detect such junk you are sending to the Web Shield and let it go through - because compressed data mostly does not adhere to HTTP standards. Anyway, there is a chance that this slipstream program accesses it's partner on some other port than 80 or 5400 and hopefully it will pass unnoticed by Web Shield - this may help. At all times, this would
NOT be the way how to make this work.
IE <- localhost:5400 gets catched by WebShield cause 5400 is redirected port <- slipstream, compressed / uncompress data <- get catched by WebShield cause slipstream is in OptinProcess <- slipstream server possibly <- HTTP server.
Hope this will bring some light. ;-)
Lukas.