
( ]. }$ Q1 z o, n' k
Regini Data [Options...] , k9 \) |# t9 E! \4 m! a5 B N6 H
Useful Options:" z. }5 |2 E6 W7 x- b
1 - Administrators Full Access
2 - Administrators Read Access
3 - Administrators Read and Write Access+ r" L% V5 A7 m
4 - Administrators Read, Write and Delete Access; t' G) ]& E0 Y2 U# D
5 - Creator Full Access
6 - Creator Read and Write Access
7 - World Full Access
8 - World Read Access
9 - World Read and Write Access, ~/ |0 b# u5 N8 _
10 - World Read, Write and Delete Access
11 - Power Users Full Access
12 - Power Users Read and Write Access& i( ?; Y/ m2 M0 e$ a# g5 o9 `2 u
13 - Power Users Read, Write and Delete Access1 H9 b) E3 X1 e! W0 S
14 - System Operators Full Access
15 - System Operators Read and Write Access; t3 X7 p! ^9 g/ X6 |& n
16 - System Operators Read, Write and Delete Access- J6 m/ x, K# D7 V3 x) }
17 - System Full Access% C5 d* R- q1 N& j6 \) G6 D
18 - System Read and Write Access9 }0 {' F6 ]+ P8 a7 D' U
19 - System Read Access
20 - Administrators Read, Write and Execute Access f& Z6 q* \$ ]+ i5 i
21 - Interactive User Full Access* U. U" d$ N4 B5 B8 d6 A
22 - Interactive User Read and Write Access
23 - Interactive User Read, Write and Delete Access
q) f' u% Q# p! s1 g8 t
Q1 ^ v8 a& T# F8 h$ }2 E
| 欢迎光临 【3.A.S.T】网络安全爱好者 (http://3ast.com/) | Powered by Discuz! 7.2 |