
. h9 ^' h6 ?1 l+ }) U3 [
Regini Data [Options...]
Useful Options:
1 - Administrators Full Access0 k1 }. r& K+ n$ T; |4 Z' k9 a
2 - Administrators Read Access! G% q4 a6 K9 ^& ?! T. s1 C3 z% |
3 - Administrators Read and Write Access
4 - Administrators Read, Write and Delete Access- f" W3 \( K( O/ `1 R
5 - Creator Full Access5 _9 b/ M) l7 S5 T9 U& W
6 - Creator Read and Write Access
7 - World Full Access# {+ n5 A( {+ D7 H% v+ F' F
8 - World Read Access
9 - World Read and Write Access
10 - World Read, Write and Delete Access
11 - Power Users Full Access
12 - Power Users Read and Write Access
13 - Power Users Read, Write and Delete Access: N( `% _9 B. D* j
14 - System Operators Full Access( _3 n0 I. ~ @" s
15 - System Operators Read and Write Access- P* H8 N! {# n, S9 T
16 - System Operators Read, Write and Delete Access
17 - System Full Access
18 - System Read and Write Access' ], h0 F; ^6 ~' T3 W. B
19 - System Read Access5 ?( F& _' P, B8 r. x& O0 S4 I
20 - Administrators Read, Write and Execute Access
21 - Interactive User Full Access
22 - Interactive User Read and Write Access
23 - Interactive User Read, Write and Delete Access7 k3 h" T; u* S" h/ U
$ k, [' g- O! C6 D
| 欢迎光临 【3.A.S.T】网络安全爱好者 (http://3ast.com/) | Powered by Discuz! 7.2 |