& B- G' w: D6 b
Regini Data [Options...] 5 V. T: M6 o# q5 m# g B
Useful Options:
1 - Administrators Full Access, T+ o4 F- D+ d: r
2 - Administrators Read Access
3 - Administrators Read and Write Access- e2 p* \0 v; Z9 k7 J
4 - Administrators Read, Write and Delete Access
5 - Creator Full Access
6 - Creator Read and Write Access
7 - World Full Access
8 - World Read Access
9 - World Read and Write Access7 j$ w: {( \9 V p3 ?/ g6 t
10 - World Read, Write and Delete Access
11 - Power Users Full Access
12 - Power Users Read and Write Access4 o4 }8 f* `' \
13 - Power Users Read, Write and Delete Access
14 - System Operators Full Access
15 - System Operators Read and Write Access
16 - System Operators Read, Write and Delete Access
17 - System Full Access# W/ T- |: F% J, G8 }: ]6 F6 F
18 - System Read and Write Access
19 - System Read Access
20 - Administrators Read, Write and Execute Access
21 - Interactive User Full Access! O- f5 L, q0 e( O$ L$ Z' t0 {4 M
22 - Interactive User Read and Write Access
23 - Interactive User Read, Write and Delete Access2 Y* K: J7 z# @0 p
# g5 p v z4 W' C. j* U0 Y: o: s
& U& A. j" \* \, o$ u9 o
欢迎光临 【3.A.S.T】网络安全爱好者 (http://3ast.com/) | Powered by Discuz! 7.2 |