
0 U. o- t& s, w% _0 X
Regini Data [Options...] % m* g5 w9 Q( A4 s5 V! h( j
Useful Options:
1 - Administrators Full Access
2 - Administrators Read Access
3 - Administrators Read and Write Access. @4 T. W4 k7 O* L, b1 {, K
4 - Administrators Read, Write and Delete Access/ W6 h8 o2 r' {) g$ i9 m
5 - Creator Full Access2 v' j& ?, e6 c2 H1 M9 }) V
6 - Creator Read and Write Access
7 - World Full Access
8 - World Read Access
9 - World Read and Write Access. @( t7 P4 k5 [8 f% `
10 - World Read, Write and Delete Access# d0 O( ?+ v. F$ |/ ]; ]
11 - Power Users Full Access
12 - Power Users Read and Write Access
13 - Power Users Read, Write and Delete Access9 \& S3 f! ^% b3 g5 Z3 Y; M
14 - System Operators Full Access
15 - System Operators Read and Write Access/ _ g) F( d: u: P7 `: }" v4 Q
16 - System Operators Read, Write and Delete Access
17 - System Full Access
18 - System Read and Write Access ?! o4 H: N( _( W' h
19 - System Read Access
20 - Administrators Read, Write and Execute Access
21 - Interactive User Full Access
22 - Interactive User Read and Write Access! g/ @$ G4 e) c. M* Z: w
23 - Interactive User Read, Write and Delete Access
& c% r1 d/ l2 s6 `
9 X& N4 z$ [! L: |8 ^2 p
| 欢迎光临 【3.A.S.T】网络安全爱好者 (http://3ast.com/) | Powered by Discuz! 7.2 |