
8 f: [3 Q/ u- F( a& j9 ?
Regini Data [Options...] / n! M. A/ r' C+ a
Useful Options:
1 - Administrators Full Access
2 - Administrators Read Access l4 E8 @7 k \* m3 g+ T
3 - Administrators Read and Write Access( c D5 D7 r1 `0 T% T, B- R4 ~
4 - Administrators Read, Write and Delete Access
5 - Creator Full Access
6 - Creator Read and Write Access/ |3 p$ G8 e% |0 M
7 - World Full Access
8 - World Read Access/ ]8 i5 t, F2 e Z# W
9 - World Read and Write Access
10 - World Read, Write and Delete Access
11 - Power Users Full Access
12 - Power Users Read and Write Access
13 - Power Users Read, Write and Delete Access" r# @) N7 w& J5 T5 b8 O5 r
14 - System Operators Full Access
15 - System Operators Read and Write Access2 D, }* ^. k9 H; q
16 - System Operators Read, Write and Delete Access; x; H5 A Z2 J8 h: c, i2 |2 Z1 U* F8 P
17 - System Full Access, w! d0 w5 r6 D8 ]
18 - System Read and Write Access* k& f, d8 ^% t( P1 i
19 - System Read Access3 N. c" d& Q7 l2 \8 [* V; c
20 - Administrators Read, Write and Execute Access
21 - Interactive User Full Access
22 - Interactive User Read and Write Access
23 - Interactive User Read, Write and Delete Access
1 z1 Y! l3 Z. V( X& a( g. t' |. W
0 m$ y4 ?, v1 _; u
| 欢迎光临 【3.A.S.T】网络安全爱好者 (http://3ast.com/) | Powered by Discuz! 7.2 |