Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Event ID:26 Application popup: Windows - Corrupt File :...

Posted on 2008-10-06
2
Medium Priority
?
1,994 Views
Last Modified: 2013-12-05
Starting getting these event errors last Thursday.

Event Type:      Information
Event Source:      Application Popup
Event Category:      None
Event ID:      26
Date:            10/6/2008
Time:            3:36:38 PM
User:            N/A
Computer:      ****
Description:
Application popup: Windows - Corrupt File : The file or directory G:\Path\File is corrupt and unreadable. Please run the Chkdsk utility.  

I censored the computer name and network path.  These errors are isolated on G: drive of our files server.  It is a extending drive on our SAN that is connected to the file server with and iSCSI initiator.  anyone have any idea what happened.  Everything was running find until last thursday
0
Comment
Question by:CityofKerrville
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 63

Accepted Solution

by:
SysExpert earned 2000 total points
ID: 22656198
DId you run diagnostics and any SAN utils to check the file system ?

 
I hope this helps !
 
0
 

Author Closing Comment

by:CityofKerrville
ID: 31503618
Yes, the disk was corrupt.  We finished the file relocation early this morning and are now working on re-establishing shares and permissions.  ugh!!!!!
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Each year, investment in cloud platforms grows more than 20% (https://www.immun.io/hubfs/Immunio_2016/Content/Marketing/Cloud-Security-Report-2016.pdf?submissionGuid=a8d80a00-6fee-4b85-81db-a4e28f681762) as an increasing number of companies begin to…
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This Micro Tutorial will teach you how to reformat your flash drive. Sometimes your flash drive may have issues carrying files so this will completely restore it to manufacturing settings. Make sure to backup all files before reformatting. This w…

715 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question