1 ~8 `& G, e& m6 T6 A8 A5 k4 @9 A
Regini Data [Options...]
Useful Options:
1 - Administrators Full Access3 E" Y1 I% `' B+ D% \8 F/ Y
2 - Administrators Read Access
3 - Administrators Read and Write Access
4 - Administrators Read, Write and Delete Access
5 - Creator Full Access- i$ j5 t- F4 G- ~$ `
6 - Creator Read and Write Access- f- j; l5 \% s' }+ M) F# z( U/ K
7 - World Full Access
8 - World Read Access' l2 a& d5 F% @( q1 P1 l) d% M
9 - World Read and Write Access
10 - World Read, Write and Delete Access
11 - Power Users Full Access' O" I) R# B Z0 t5 j1 D5 m
12 - Power Users Read and Write Access/ ^1 Q4 ?6 P* U9 ?
13 - Power Users Read, Write and Delete Access* j1 l/ V& i) C; J3 w. {
14 - System Operators Full Access
15 - System Operators Read and Write Access
16 - System Operators Read, Write and Delete Access% p g2 W \+ L$ _3 C8 C
17 - System Full Access( g6 i* l, a, ?) r% g: B! q
18 - System Read and Write Access
19 - System Read Access
20 - Administrators Read, Write and Execute Access' A3 I) S! h& x4 L7 J
21 - Interactive User Full Access
22 - Interactive User Read and Write Access1 h+ h$ v4 l* P9 p- }
23 - Interactive User Read, Write and Delete Access
' E$ }* z3 V- Z2 w
欢迎光临 【3.A.S.T】网络安全爱好者 (http://3ast.com/) | Powered by Discuz! 7.2 |