
" H# C3 J1 Z' u0 {5 R+ S
Regini Data [Options...]
Useful Options:+ O1 v# e# L; n2 l' U3 G( w
1 - Administrators Full Access
2 - Administrators Read Access7 u% z( e+ `( E& A7 T1 \
3 - Administrators Read and Write Access
4 - Administrators Read, Write and Delete Access
5 - Creator Full Access7 M8 Y& `- [" d* z$ K- q% |
6 - Creator Read and Write Access
7 - World Full Access
8 - World Read Access
9 - World Read and Write Access J e' ], q# n' z; Z, t5 m% y
10 - World Read, Write and Delete Access0 y+ Z5 _# |' K/ U3 j" L
11 - Power Users Full Access5 B8 X, T% o% X: g
12 - Power Users Read and Write Access
13 - Power Users Read, Write and Delete Access8 D1 C" ]' C; z6 I0 c, L) Y5 w
14 - System Operators Full Access) E) s, p/ Q0 J A, [- U- F7 [* T
15 - System Operators Read and Write Access
16 - System Operators Read, Write and Delete Access
17 - System Full Access! W$ f3 l& @) I$ a
18 - System Read and Write Access( y0 ?4 q' a& V- q
19 - System Read Access6 S9 k0 T f" N! H! I/ v) F" u2 c0 c
20 - Administrators Read, Write and Execute Access
21 - Interactive User Full Access
22 - Interactive User Read and Write Access9 _; I5 ^9 O) Y+ v) J
23 - Interactive User Read, Write and Delete Access
* `0 E' `$ R8 m) p5 O9 i
" ]+ f2 C0 V D8 k, l
| 欢迎光临 【3.A.S.T】网络安全爱好者 (http://3ast.com/) | Powered by Discuz! 7.2 |