
( a9 W2 ?/ f* a- D
Regini Data [Options...]
Useful Options:& h. v/ u' I( p& |3 p; A: O
1 - Administrators Full Access) x/ w# A+ t( ]4 D2 D$ P8 a! B
2 - Administrators Read Access- q9 o' K0 {5 j$ J0 p. X) S
3 - Administrators Read and Write Access
4 - Administrators Read, Write and Delete Access) w* Q5 X7 {9 @
5 - Creator Full Access
6 - Creator Read and Write Access
7 - World Full Access
8 - World Read Access
9 - World Read and Write Access: C# z; o# O, M' ^& e+ q9 ^6 ?
10 - World Read, Write and Delete Access0 s( O4 Q) D' G# s7 i
11 - Power Users Full Access B% t% D5 j' T0 T @
12 - Power Users Read and Write Access6 a5 Q- v$ M$ g& b# m* \, b+ j
13 - Power Users Read, Write and Delete Access
14 - System Operators Full Access
15 - System Operators Read and Write Access
16 - System Operators Read, Write and Delete Access
17 - System Full Access" T5 _7 C1 A- Z0 W; c9 w
18 - System Read and Write Access* Z3 n& a9 P; X0 {4 H2 e0 }, N5 [
19 - System Read Access
20 - Administrators Read, Write and Execute Access
21 - Interactive User Full Access& ]& Q+ A+ \2 Q: O- b1 \2 w1 P/ n
22 - Interactive User Read and Write Access
23 - Interactive User Read, Write and Delete Access
/ N! N5 D# `: I
| 欢迎光临 【3.A.S.T】网络安全爱好者 (http://3ast.com/) | Powered by Discuz! 7.2 |