Regini Data [Options...] 2 A6 e7 i- e \5 f- B& ^6 h0 r
Useful Options:/ i2 R5 g. m% ~$ y; I
1 - Administrators Full Access8 Y- I. ~+ w- B: i" y) i( q" ]/ R! y
2 - Administrators Read Access9 X0 T& F: M+ G& [* E( O
3 - Administrators Read and Write Access
4 - Administrators Read, Write and Delete Access0 ^* l @, ]. z5 t# L
5 - Creator Full Access
6 - Creator Read and Write Access' ^' U. L5 l% k- g9 N
7 - World Full Access
8 - World Read Access
9 - World Read and Write Access; P F- R0 j- t# W$ f& o5 `, r
10 - World Read, Write and Delete Access
11 - Power Users Full Access
12 - Power Users Read and Write Access
13 - Power Users Read, Write and Delete Access
14 - System Operators Full Access
15 - System Operators Read and Write Access
16 - System Operators Read, Write and Delete Access
17 - System Full Access5 q( W, Y! M4 u8 w, H# J& j/ @1 g
18 - System Read and Write Access* d e+ ~* } O/ C. |- J1 _/ L% Q
19 - System Read Access
20 - Administrators Read, Write and Execute Access; m, [4 T0 I( n: r+ A1 y5 U$ X6 k
21 - Interactive User Full Access& S: t" _* j) \/ q! v! I% A* [* f
22 - Interactive User Read and Write Access% H* t+ b9 q" d- _; i
23 - Interactive User Read, Write and Delete Access
! \7 F1 H) B- `( E5 R T9 g: ^9 q
$ ], z$ ^# Z; M+ x
欢迎光临 【3.A.S.T】网络安全爱好者 (http://3ast.com./) | Powered by Discuz! 7.2 |