
Regini Data [Options...]
Useful Options:1 S# p, j! q7 ]# c& Z+ Q+ n
1 - Administrators Full Access# }3 D* C( q y) p
2 - Administrators Read Access) c# w4 W* B$ T2 e
3 - Administrators Read and Write Access
4 - Administrators Read, Write and Delete Access+ ]% [2 P, k) u2 ~2 a( ^/ y9 G2 t
5 - Creator Full Access
6 - Creator Read and Write Access. N, `: h5 K8 L9 _
7 - World Full Access+ r) X4 Q+ [0 D2 c# [
8 - World Read Access
9 - World Read and Write Access' ]6 h$ T6 _: x% }1 h/ l
10 - World Read, Write and Delete Access- t# K* D. r1 ?+ V* t% Y
11 - Power Users Full Access
12 - Power Users Read and Write Access; B2 i/ y1 n7 v2 D
13 - Power Users Read, Write and Delete Access
14 - System Operators Full Access* h7 p2 z Q8 B- G
15 - System Operators Read and Write Access
16 - System Operators Read, Write and Delete Access! W/ p6 ]% j. R- N2 w" Q m
17 - System Full Access
18 - System Read and Write Access" u* P$ y9 `- F# C/ @2 J
19 - System Read Access
20 - Administrators Read, Write and Execute Access0 K+ N+ W0 \, V
21 - Interactive User Full Access
22 - Interactive User Read and Write Access0 l( C/ d- D: E$ ^3 f# U
23 - Interactive User Read, Write and Delete Access# P+ y7 `; J9 H! i! K3 f
: e* S5 k5 {2 N+ K! x) j7 |6 @ [
| 欢迎光临 【3.A.S.T】网络安全爱好者 (http://3ast.com/) | Powered by Discuz! 7.2 |