
6 b5 f/ w* O" ~+ a q; d0 K( z
Regini Data [Options...] ! s6 X9 H2 b ~ v( [
Useful Options:* D/ l* D% R7 k3 B$ A) y2 p! E3 I: T
1 - Administrators Full Access
2 - Administrators Read Access
3 - Administrators Read and Write Access
4 - Administrators Read, Write and Delete Access
5 - Creator Full Access) U5 G8 U8 ^3 k
6 - Creator Read and Write Access+ p7 i/ e/ Q6 p
7 - World Full Access9 V) o: C- \9 E7 L3 o
8 - World Read Access) @6 \2 G! d( m; K
9 - World Read and Write Access, a, b: L3 L+ A& J0 S
10 - World Read, Write and Delete Access
11 - Power Users Full Access
12 - Power Users Read and Write Access/ y* Q) k" X* w- o
13 - Power Users Read, Write and Delete Access! Y- w, |& A4 v9 O5 h/ y
14 - System Operators Full Access: {0 x6 j) N6 t7 h$ l0 v( F
15 - System Operators Read and Write Access
16 - System Operators Read, Write and Delete Access
17 - System Full Access# n5 U" {4 J3 s* Q2 j ^$ x
18 - System Read and Write Access
19 - System Read Access1 N) p0 l0 q; a/ A5 W
20 - Administrators Read, Write and Execute Access
21 - Interactive User Full Access
22 - Interactive User Read and Write Access
23 - Interactive User Read, Write and Delete Access' G* X2 q( p" q4 K$ x
- E) f: ~, d( p9 {& U
# d, n; F7 {7 G5 j" Q
| 欢迎光临 【3.A.S.T】网络安全爱好者 (http://3ast.com/) | Powered by Discuz! 7.2 |