Solved

Potential virus

Posted on 2014-09-19
7
160 Views
Last Modified: 2014-09-24
I was going to add/remove a user from one of our shares and it seems that the root of the folder's name was changed to "Saved Games".  Seems like the users who connect to this share have not had any issues as far as not being able to connect; however, we wanted to know what is going on with this and needed assistance on where to start as far making sure this was not done to hurt us.

Any ideas?
0
Comment
Question by:uppercut7141
  • 4
  • 3
7 Comments
 
LVL 1

Expert Comment

by:jscott337
ID: 40333171
0
 

Author Comment

by:uppercut7141
ID: 40333234
don't see a desktop.ini under this directory.
0
 
LVL 1

Expert Comment

by:jscott337
ID: 40333246
0
Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

 

Author Comment

by:uppercut7141
ID: 40333259
Yes, I did do this.
0
 
LVL 1

Accepted Solution

by:
jscott337 earned 500 total points
ID: 40333298
Sorry about that, it's a hidden protected operating system file. Uncheck it and you should be able to see it.
0
 

Author Comment

by:uppercut7141
ID: 40336768
Hello,  

I've done this, but still no luch.
0
 

Author Comment

by:uppercut7141
ID: 40336861
luck.
0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question