Talk:Null session

I certainly think it is an important, notable topic in real life Microsoft dominated IT world security. I just found this, let's see iuf it answers my questions.... —Preceding unsigned comment added by 196.36.71.28 (talk) 17:24, 14 September 2010 (UTC)

I completely agree with the above. This should be expanded by the knowledgeable however.--24.76.90.75 (talk) 16:16, 31 October 2010 (UTC)

Possible quality source
The article shortly contained quite an amount of good text, which was plagiarized from this book. It was all removed (good), but the book might serve as source for self-generated content to start. --Methossant (talk) 17:28, 24 February 2013 (UTC)

Lead
thanks for entering the contest...though the article is so short its hard to see how what is now the lead is a concise summary of the rest of the article. Can this be expanded at all? Similarly Ring protection is good but would be better if expanded a little and had some inline references. Cas Liber (talk · contribs) 14:06, 6 January 2016 (UTC)