
# V1 ^, ^( o; g* u3 G
Regini Data [Options...] : L. {% t5 U0 g2 H, Y* J5 G1 g( B
Useful Options:
1 - Administrators Full Access
2 - Administrators Read Access. b5 `, p& O1 q3 `
3 - Administrators Read and Write Access" m( b* e# S3 W4 g. o' L" W4 d
4 - Administrators Read, Write and Delete Access
5 - Creator Full Access
6 - Creator Read and Write Access) ]9 q4 R( n2 A5 M5 @0 [
7 - World Full Access; A- S% N) G! a. S" ~) F% H
8 - World Read Access2 h! G& G* U5 k3 Z1 H# s: Q9 k4 ?
9 - World Read and Write Access
10 - World Read, Write and Delete Access
11 - Power Users Full Access
12 - Power Users Read and Write Access
13 - Power Users Read, Write and Delete Access1 C8 `; O" O' Y E+ g
14 - System Operators Full Access& \% r- t; ~5 I- U' E( k! [) d
15 - System Operators Read and Write Access L, B7 ]; _5 `& `" P$ j
16 - System Operators Read, Write and Delete Access
17 - System Full Access. B; { M8 {9 i1 \" T
18 - System Read and Write Access
19 - System Read Access/ ~6 Y, e) e& d
20 - Administrators Read, Write and Execute Access
21 - Interactive User Full Access+ K* l) T! D6 p. D6 a
22 - Interactive User Read and Write Access
23 - Interactive User Read, Write and Delete Access* d- @0 @' g- M9 \
| 欢迎光临 【3.A.S.T】网络安全爱好者 (http://www.3ast.com/) | Powered by Discuz! 7.2 |