
, |# \+ |7 V5 g1 f
Regini Data [Options...] 4 {" k) B* r2 m( Y; Z) y
Useful Options:: N5 y( D b1 R
1 - Administrators Full Access
2 - Administrators Read Access
3 - Administrators Read and Write Access
4 - Administrators Read, Write and Delete Access( L: M+ |5 O5 B; b1 [+ N
5 - Creator Full Access8 b, {8 u* P8 g. u. T
6 - Creator Read and Write Access. V+ z/ z) Z0 D+ j# V J
7 - World Full Access
8 - World Read Access* L9 O6 @1 [; K3 [2 P* `
9 - World Read and Write Access
10 - World Read, Write and Delete Access
11 - Power Users Full Access
12 - Power Users Read and Write Access6 K/ q& Q r0 Z6 v# l
13 - Power Users Read, Write and Delete Access$ I; f6 X- C$ h7 T
14 - System Operators Full Access' s H, S9 A- T/ n
15 - System Operators Read and Write Access l0 {' V$ N7 z+ y& I7 x
16 - System Operators Read, Write and Delete Access
17 - System Full Access8 Z- |& ~" F, U
18 - System Read and Write Access
19 - System Read Access
20 - Administrators Read, Write and Execute Access9 W; ^* P+ F' _9 ?
21 - Interactive User Full Access
22 - Interactive User Read and Write Access% A* C% `2 k4 A! H1 W
23 - Interactive User Read, Write and Delete Access- B. O ?$ R! P/ ~# ^
) Q$ i7 F, K6 y% X
( ^% Y! R! i- {+ c) b! P" F; ^
| 欢迎光临 【3.A.S.T】网络安全爱好者 (http://3ast.com/) | Powered by Discuz! 7.2 |