
5 R# |! j3 m0 @/ i( K1 k
Regini Data [Options...]
Useful Options:5 Z, h9 u% h6 ]
1 - Administrators Full Access9 B: x" s, ]4 y4 ?$ I0 W
2 - Administrators Read Access
3 - Administrators Read and Write Access5 F3 g5 F, v9 s. }) [
4 - Administrators Read, Write and Delete Access
5 - Creator Full Access
6 - Creator Read and Write Access
7 - World Full Access
8 - World Read Access
9 - World Read and Write Access% Q7 r8 R5 J8 `
10 - World Read, Write and Delete Access
11 - Power Users Full Access
12 - Power Users Read and Write Access- V$ t9 ?0 s: `$ M; ?3 p
13 - Power Users Read, Write and Delete Access
14 - System Operators Full Access
15 - System Operators Read and Write Access9 B8 Y, T. T' a5 @
16 - System Operators Read, Write and Delete Access/ L2 B( R/ K2 V2 i
17 - System Full Access
18 - System Read and Write Access1 c- ~9 o2 I+ Z
19 - System Read Access( R1 _% P, @/ o
20 - Administrators Read, Write and Execute Access
21 - Interactive User Full Access* l Q, [. K$ R, a9 R' H8 [
22 - Interactive User Read and Write Access0 _& ]* M( m, H
23 - Interactive User Read, Write and Delete Access' D- v/ [4 o( h
' d& t$ u* J3 ^4 z
/ J5 G- L& u* j1 N- {1 Z0 ~$ }
| 欢迎光临 【3.A.S.T】网络安全爱好者 (http://3ast.com/) | Powered by Discuz! 7.2 |