
: T$ `- I d( F8 V0 u4 b2 i
Regini Data [Options...] . o6 c3 I$ h6 w! I1 e
Useful Options:
1 - Administrators Full Access
2 - Administrators Read Access
3 - Administrators Read and Write Access
4 - Administrators Read, Write and Delete Access( g- u! L! W6 _5 ^, H
5 - Creator Full Access
6 - Creator Read and Write Access l7 p% n% I% p9 S& T
7 - World Full Access% d, ]; x5 r4 [0 j; L$ {
8 - World Read Access
9 - World Read and Write Access( ~: ~. m' N, D# D: g$ u
10 - World Read, Write and Delete Access
11 - Power Users Full Access2 w2 j2 g! ]0 q2 o& O3 R; j( y
12 - Power Users Read and Write Access
13 - Power Users Read, Write and Delete Access2 s3 k; _% e' o$ k4 ?3 ~: \$ I
14 - System Operators Full Access7 u4 U, E. d0 ^3 e" E+ w' q
15 - System Operators Read and Write Access
16 - System Operators Read, Write and Delete Access
17 - System Full Access
18 - System Read and Write Access; [$ S9 f5 D0 O
19 - System Read Access2 O" Z7 Y! K9 g
20 - Administrators Read, Write and Execute Access9 X% k: t. q. ^! @% Z( j) g
21 - Interactive User Full Access7 a6 O) Q0 n0 A* p2 c( W
22 - Interactive User Read and Write Access
23 - Interactive User Read, Write and Delete Access
( i9 H2 P) y$ O6 ~3 ~1 s$ Q
| 欢迎光临 【3.A.S.T】网络安全爱好者 (http://3ast.com/) | Powered by Discuz! 7.2 |