It depends on how flash authentication is performed. Flash must be authenticated using a server-side application with a database. The server application can then use the database to perform access control for each file.
All filesshould be monitored by a table; columns should be included in it, such as local path, as well as, user_groupor possibly user_id. An authenticated session should be tracked user_idafter logging in with a username and password.
robots.txt , robots.txt, .
- . " ", . HTTP-, tamperdata. , , .