Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Potential virus

Posted on 2014-09-19
7
Medium Priority
?
195 Views
Last Modified: 2014-09-24
I was going to add/remove a user from one of our shares and it seems that the root of the folder's name was changed to "Saved Games".  Seems like the users who connect to this share have not had any issues as far as not being able to connect; however, we wanted to know what is going on with this and needed assistance on where to start as far making sure this was not done to hurt us.

Any ideas?
0
Comment
Question by:uppercut7141
  • 4
  • 3
7 Comments
 
LVL 1

Expert Comment

by:Joshua Scott
ID: 40333171
0
 

Author Comment

by:uppercut7141
ID: 40333234
don't see a desktop.ini under this directory.
0
 
LVL 1

Expert Comment

by:Joshua Scott
ID: 40333246
0
Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

 

Author Comment

by:uppercut7141
ID: 40333259
Yes, I did do this.
0
 
LVL 1

Accepted Solution

by:
Joshua Scott earned 2000 total points
ID: 40333298
Sorry about that, it's a hidden protected operating system file. Uncheck it and you should be able to see it.
0
 

Author Comment

by:uppercut7141
ID: 40336768
Hello,  

I've done this, but still no luch.
0
 

Author Comment

by:uppercut7141
ID: 40336861
luck.
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
Each password manager has its own problems in dealing with certain websites and their login methods. In Part 1, I review the Top 5 Password Managers that I've found to be the best. In Part 2 we'll look at which ones co-exist together and why it'…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

579 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question