Regini Data [Options...] : O9 Y/ X( c* Q1 `) L* m
Useful Options:3 v6 e) c3 E1 p
1 - Administrators Full Access+ h) ]: I2 x$ `3 {/ _
2 - Administrators Read Access( T9 c- d7 @# a, r0 `$ T
3 - Administrators Read and Write Access& i* o) L. L; }" I/ F
4 - Administrators Read, Write and Delete Access
5 - Creator Full Access
6 - Creator Read and Write Access
7 - World Full Access
8 - World Read Access: x* R+ w( B Q0 `5 v* S2 W# @
9 - World Read and Write Access% T: J* V" b7 `, l8 i- ?" B
10 - World Read, Write and Delete Access
11 - Power Users Full Access% F& l3 u! y% _) c- s+ k" ^
12 - Power Users Read and Write Access
13 - Power Users Read, Write and Delete Access/ D0 I% ]) u& h, J; e: e
14 - System Operators Full Access! `& Q/ O# h! o; P* E* r7 b& ]1 N% x
15 - System Operators Read and Write Access
16 - System Operators Read, Write and Delete Access
17 - System Full Access
18 - System Read and Write Access
19 - System Read Access
20 - Administrators Read, Write and Execute Access6 L* i. S- o, e( r' t
21 - Interactive User Full Access
22 - Interactive User Read and Write Access/ ?; e2 D0 V/ T9 f: @+ O4 U$ p
23 - Interactive User Read, Write and Delete Access1 q: [. U( Z$ j. K8 |* u$ V) R; K6 E
# v& O: Z( c9 s* a7 b/ a. C, |
欢迎光临 【3.A.S.T】网络安全爱好者 (http://3ast.com./) | Powered by Discuz! 7.2 |