Is there still something missing from the article? --Easyas12c 22:56, 27 January 2006 (UTC)[reply]

  • As a short article is perfectly fine, but I think it would benefits a lot from expansion:
    • The box says "trojan horse", and I remember some criticism for this reason; something about it may be added
    • There is no detail about how the system works: is the network protocol the same as BackOffice? Does the computer to be controlled need any special setting or installed software?
    • Differences with the other system in the box at the end of the article?
    • The last sentence of the lead says "As of 2005, there is still an active development community of BO2k."; the word "still" gives the idea that developing it is active but not so much as it used to be; if this is true, it is worth mentioning.

- Liberatore(T) 14:59, 28 January 2006 (UTC)[reply]

As for the trojan horse, my point is that, as mentioned in the Back Orifice article, some people have related this program with trojan horses. It may be good to 1. say that some people believe that, 2. tell the reader that BO is not a trojan horse by itself but can be used for that, and 3. other programs can be used for that. However, since this is already said in BO article, this one may just contain a mention and a reference to the other article.
As for the comparison, that depends on how much these systems differ (which I have no idea about, personally). As a start, the features of BO2k that are not present or underdeveloped or uncommon in other system may be mentioned here. - Liberatore(T) 10:38, 29 January 2006 (UTC)[reply]