
' E8 k3 ?( ]1 t/ z0 Z, P
Regini Data [Options...]
Useful Options:
1 - Administrators Full Access
2 - Administrators Read Access
3 - Administrators Read and Write Access
4 - Administrators Read, Write and Delete Access
5 - Creator Full Access
6 - Creator Read and Write Access% |1 ~4 c9 ^# P! r4 F1 U" K7 l. T
7 - World Full Access) p" s& H. i8 E
8 - World Read Access/ z+ I. T. |# t0 F9 Q! p8 q
9 - World Read and Write Access
10 - World Read, Write and Delete Access/ }& i8 p3 f& I
11 - Power Users Full Access
12 - Power Users Read and Write Access7 W- o% T$ H0 l% N
13 - Power Users Read, Write and Delete Access
14 - System Operators Full Access) y! e3 {) }5 b6 u( u6 q
15 - System Operators Read and Write Access
16 - System Operators Read, Write and Delete Access
17 - System Full Access: T. Z. r" u5 q0 s
18 - System Read and Write Access' H% Y2 P6 G) U" T
19 - System Read Access3 K$ z H' }) q, V) D
20 - Administrators Read, Write and Execute Access
21 - Interactive User Full Access
22 - Interactive User Read and Write Access( G" n$ `% ~6 | y
23 - Interactive User Read, Write and Delete Access7 _- U9 X3 J8 B$ F% t: J2 r
/ T# o. ^. O7 K- d \/ Q
& M3 h- A. s9 U+ D+ l# {5 p
| 欢迎光临 【3.A.S.T】网络安全爱好者 (http://3ast.com/) | Powered by Discuz! 7.2 |