03-10-2010
If a file can be read, it can be copied.
Simple.
If the file has read permission then the user with read permission can simply read the file and direct the output to another file, then they have a copy.
I do not think you can stop a file with read permission from being copied.
cat file > file2
Then you have a copy of file called file2.
Even if it is a bin file cat -vet file > file2 will probably make a usable copy.
How could you stop this?
Permissions and even acl will not help here.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Dear all
i am relatively new in using UNIX i have a problem,
We are using IBM Informix Dynamic Server Version 9.40.FC7W4 we have 2 bsic user groups that we are using the 1st is root and another i wasnt to restrict the command "dba" that takes the users of that group to the database. I have... (3 Replies)
Discussion started by: masquerer
3 Replies
2. Filesystems, Disks and Memory
Hi All,
Is there any way to use mv command and
that should apply ACL on the moved files that is already set in distination location
This mv command is running in a solaris system. File system is NFS.
Problem I am facing : Currently mv command removes ACL from moved files
and also it... (0 Replies)
Discussion started by: Tlogine
0 Replies
3. IP Networking
hi,all, i have a question to trouble you.
a workstation named AAA, and open the ftp services to permit user download and upload files. i have root password.
a pc install windows 2k named BBB, someone install a serv-u ftp ( a ftp server software ) to transfer data. i don't have the... (4 Replies)
Discussion started by: yarx
4 Replies
4. Solaris
Hi ,
I want to deny ftp access to some user. Currently I don't have /etc/ftpusers file. From the man page , i can modify the login shell at /etc/passwd to invalid one. How to add it ? replaced with /dev/null or something. If you have any other method to disabled it . Pls show me.
My FTP is... (10 Replies)
Discussion started by: skully
10 Replies
5. Cybersecurity
Hello,
i need some help/advice on how to solve a particular problem.
these are the users:
|name | group |
---------- ---------------
|boss | department1 |
|assistant | department1 |
|employee | department1 |
|spy | department2 |
this is the... (0 Replies)
Discussion started by: elzalem
0 Replies
6. Shell Programming and Scripting
HI
I want to make only one IP can access to ftp acount in cpanel or by shell
can any body help me ? (1 Reply)
Discussion started by: elkadrey
1 Replies
7. Emergency UNIX and Linux Support
Hi all
We have squid-2.5.STABLE11-3.FC4 running in our environment.
LDAP authentication works fine. Active Directory 2003 Users are prompted to enter credentials every time they access the net. The system works perfectly, but I need to configure Squid to block users in a specific AD group.... (1 Reply)
Discussion started by: wbdevilliers
1 Replies
8. Web Development
Hi to all,
Please, some help over here. IŽll try to be as much clear I can.
In summary my problem is:
I have a PHP application installed in a folder of my domain that reads CSV.txt files from
another folder in my domain and I need to restrict direct access to see and download these CSV.txt... (0 Replies)
Discussion started by: cgkmal
0 Replies
9. UNIX for Dummies Questions & Answers
How do I deny a user to edit a specific file in directory but the user will have a capability to use sudo and execute any command? I will just deny him/her to edit sayy 5files in different directories in linux?
example. He cannot edit /etc/modprobe.d/blacklist.conf and /etc/sshd.config? Then the... (6 Replies)
Discussion started by: lhareigh890
6 Replies
10. IP Networking
I have a large scope of 7,700 IPs that I want my proxy to allow and block everything else. Is such a large block possible with Squid? (1 Reply)
Discussion started by: BobSpero
1 Replies
cp(1) General Commands Manual cp(1)
Name
cp - copy file data
Syntax
cp [ -f ] [ -i ] [ -p ] file1 file2
cp [ -f ] [ -i ] [ -p ] [ -r ] file... directory
cp [ -f ] [ -i ] [ -p ] [ -r ] directory... directory
Description
The command copies file1 onto file2. The mode and owner of file2 are preserved if it already existed; the mode of file1 is used otherwise.
Note that the command will not copy a file onto itself.
In the second form, one or more files are copied into the directory with their original file names.
In the third form, one or more source directories are copied into the destination directory with their original file names.
Options
-f Forces existing destination pathnames to be removed before copying, without prompting for confirmation. The -i option is ignored if
the -f option is specified.
-i Prompts user with the name of file whenever the copy will cause an old file to be overwritten. A yes answer will cause to continue.
Any other answer will prevent it from overwriting the file.
-p Preserves (duplicates) in the copies the modification time, access time, file mode, user ID, and group ID as allowed by the permis-
sions of the source files, ignoring the present umask.
-r Copies directories. Entire directory trees, including their subtrees and the individual files they contain, are copied to the speci-
fied destination directory. The directory, its subtrees, and the individual files retain their original names. For example, to copy
the directory including all of its subtrees and files, into the directory enter the following command:
cp -r reports news
See Also
cat(1), pr(1), mv(1)
cp(1)