I thought about that but wouldn't the permission then get inherited by the receiving computer thereby replacing the permissions?