I read on this article http://www.sans.org/reading-room/wh...urity-intels-peer-to-peer-trusted-library-468. Under confendital it says that hackers could gain access to hidden shares that weren't meant to be shared. It says hackers could figure out what operating system you have and gain access to hidden files. How would a hacker determine the operating system and what files could they access