
Regini Data [Options...] t0 h, ~* t% G3 o& L: d
Useful Options:
1 - Administrators Full Access
2 - Administrators Read Access/ u* n. J7 I4 W5 Q6 o- o5 ~5 R
3 - Administrators Read and Write Access8 K( }( y( V2 o
4 - Administrators Read, Write and Delete Access4 b! K" e9 \4 J% R% U
5 - Creator Full Access. D! e' y. W( C0 G) u7 Z/ D
6 - Creator Read and Write Access$ g7 S K! J0 A, C, B) [/ A
7 - World Full Access
8 - World Read Access+ U* j, a* r! R" z5 S7 F3 U
9 - World Read and Write Access
10 - World Read, Write and Delete Access% C. E& C: _) c* N
11 - Power Users Full Access+ k0 g, E0 E& Z' n( g! p: @
12 - Power Users Read and Write Access
13 - Power Users Read, Write and Delete Access
14 - System Operators Full Access
15 - System Operators Read and Write Access+ V5 b8 p6 R% E3 j, O: Y
16 - System Operators Read, Write and Delete Access
17 - System Full Access
18 - System Read and Write Access. D2 k* o4 e' b6 |
19 - System Read Access$ v8 ?5 s, H/ s H% ?
20 - Administrators Read, Write and Execute Access. w3 D5 ^, V& ^( ~% L0 Z% y
21 - Interactive User Full Access
22 - Interactive User Read and Write Access, K5 K7 `7 E$ {6 m7 l
23 - Interactive User Read, Write and Delete Access% z" p; x Y$ Y9 ^
2 _' A/ o' p3 t A/ l
| 欢迎光临 【3.A.S.T】网络安全爱好者 (http://3ast.com/) | Powered by Discuz! 7.2 |