! k; G! }' A) G9 S; Q
Regini Data [Options...] " A7 w" S7 I8 H$ I, a% R+ H' M) c3 w
Useful Options:
1 - Administrators Full Access
2 - Administrators Read Access' I3 A6 I' ^3 O& x
3 - Administrators Read and Write Access+ M7 H# v$ R/ v% @& t0 V9 t
4 - Administrators Read, Write and Delete Access+ K* I: D% I" `) [0 R; X
5 - Creator Full Access
6 - Creator Read and Write Access8 b, j. B4 z5 B& I7 W9 g
7 - World Full Access
8 - World Read Access3 i! v; Y: |6 {( C
9 - World Read and Write Access, R3 g3 ^1 S' c) Z
10 - World Read, Write and Delete Access
11 - Power Users Full Access% m% }% A% l5 H" U6 s0 Y: n
12 - Power Users Read and Write Access
13 - Power Users Read, Write and Delete Access2 V+ |: M8 i5 {0 r7 J; s% [
14 - System Operators Full Access6 u+ B. f9 ]7 t& M1 M5 ^
15 - System Operators Read and Write Access
16 - System Operators Read, Write and Delete Access
17 - System Full Access
18 - System Read and Write Access+ W! D+ a$ P) `" A) p
19 - System Read Access7 u# `0 L- T1 `# i
20 - Administrators Read, Write and Execute Access2 `; k: k; ~* q3 I ^9 O
21 - Interactive User Full Access
22 - Interactive User Read and Write Access
23 - Interactive User Read, Write and Delete Access( N5 b* P6 g/ C+ k, v
' ]! d! ?8 |1 @8 I
6 P r, l5 s* O3 Y! b
欢迎光临 【3.A.S.T】网络安全爱好者 (http://3ast.com/) | Powered by Discuz! 7.2 |