Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

Compromised files?


  • Please log in to reply

#1
seajay34

seajay34

    New Member

  • Member
  • Pip
  • 2 posts

I'm not sure if this is where I ask this question.  My husband has a shared drive at his work.  When he was looking at the shared drive, there was a file with a co-workers name on it (this co-worker has been filing complaints against others and is always looking for "dirt" to use).  When he clicked on the file, it contained practically a mirror image of all of the files on his machine.  These files contain performance reviews and other confidential information.  When he asked IT about it, they said that when he clicked on it, he was just being redirected back to his own machine.  IT then deleted the file.  He is concerned that his files have been compromised and was wondering why his files would be listed under a different person's name.  He cannot get a straight answer from IT and whether it is possible that it could happen again.  Should he be concerned?


  • 0

Advertisements


#2
FreeBooter

FreeBooter

    Member 1K

  • Member
  • PipPipPipPip
  • 1,133 posts

Hi seajay34,

 

When sharing a file only the owner of the file have share permissions to share files and give access permissions to shared resources to other users on the network. 


  • 0

#3
seajay34

seajay34

    New Member

  • Topic Starter
  • Member
  • Pip
  • 2 posts

Hi seajay34,

 

When sharing a file only the owner of the file have share permissions to share files and give access permissions to shared resources to other users on the network. 

Thank you very much for your response.  That is a relief that this employee did not gain access to confidential files.  It just seems odd that the file had the employee's name, even though they were not her files.  Thanks again!


  • 0

#4
FreeBooter

FreeBooter

    Member 1K

  • Member
  • PipPipPipPip
  • 1,133 posts

You are very welcome!


  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP