This article is rated Stub-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||
|
I certainly think it is an important, notable topic in real life Microsoft dominated IT world security. I just found this, let's see iuf it answers my questions.... —Preceding unsigned comment added by 196.36.71.28 (talk) 17:24, 14 September 2010 (UTC)
I completely agree with the above. This should be expanded by the knowledgeable however.--24.76.90.75 (talk) 16:16, 31 October 2010 (UTC)
Possible quality source
editThe article shortly contained quite an amount of good text, which was plagiarized from this book. It was all removed (good), but the book might serve as source for self-generated content to start. --Methossant (talk) 17:28, 24 February 2013 (UTC)
Lead
edit@Kvng: thanks for entering the contest...though the article is so short its hard to see how what is now the lead is a concise summary of the rest of the article. Can this be expanded at all? Similarly Ring protection is good but would be better if expanded a little and had some inline references. Cas Liber (talk · contribs) 14:06, 6 January 2016 (UTC)