Billion hah Anton? Is MS buying you out to build iSCSI target functionality in Windows or something? :) On a serious note, a good methodology is to force CHAP authentication on the target so only the intended initiator can connect to it, comes in handy when there are too many hands in the cookie jar...