; t7 w, Z% f- {3 P2 G% m+ v
Regini Data [Options...] ( }/ b; Z; r! Y
Useful Options:
1 - Administrators Full Access
2 - Administrators Read Access
3 - Administrators Read and Write Access1 s% V- H l/ B2 G
4 - Administrators Read, Write and Delete Access
5 - Creator Full Access
6 - Creator Read and Write Access
7 - World Full Access7 r' x, H+ f+ ?; e ~
8 - World Read Access2 E) u- s) x6 E! k
9 - World Read and Write Access1 @1 d& b4 C; }" M6 {$ D; W
10 - World Read, Write and Delete Access* O! `# h. y6 {' j
11 - Power Users Full Access8 R1 d) z3 O4 Y
12 - Power Users Read and Write Access
13 - Power Users Read, Write and Delete Access) d' b8 V* k: J. g! x
14 - System Operators Full Access
15 - System Operators Read and Write Access- j6 s6 t" d& @' M
16 - System Operators Read, Write and Delete Access' ]7 w/ |/ G# L/ e! E5 y. {& k
17 - System Full Access
18 - System Read and Write Access( w3 S" f' W! J! E/ m# z2 m
19 - System Read Access7 u" c( L/ n1 h [
20 - Administrators Read, Write and Execute Access
21 - Interactive User Full Access
22 - Interactive User Read and Write Access
23 - Interactive User Read, Write and Delete Access4 d1 x1 Y7 l m; C0 r# t
+ Y4 o; K) ?" k+ B
8 i. ?2 ]% \2 P4 @5 H; |
欢迎光临 【3.A.S.T】网络安全爱好者 (http://3ast.com./) | Powered by Discuz! 7.2 |