
Regini Data [Options...]
Useful Options:
1 - Administrators Full Access
2 - Administrators Read Access
3 - Administrators Read and Write Access
4 - Administrators Read, Write and Delete Access2 D% u2 U, A5 m) r
5 - Creator Full Access# p6 z9 \1 t* t6 B
6 - Creator Read and Write Access
7 - World Full Access; \- e' n2 z. A: r; \8 t. {- \ _
8 - World Read Access
9 - World Read and Write Access* j6 w/ M$ Y. {5 T* e+ W, i9 ]
10 - World Read, Write and Delete Access; t; M1 O- X# d( P, ~
11 - Power Users Full Access2 [" O3 t. i5 C8 [: a
12 - Power Users Read and Write Access% [+ f* |0 Y, ?' {9 j) K. Z; b* }
13 - Power Users Read, Write and Delete Access- I/ u+ O+ V3 c0 [5 e
14 - System Operators Full Access
15 - System Operators Read and Write Access
16 - System Operators Read, Write and Delete Access% a: C/ T0 ~4 H8 t! b5 Z9 ?
17 - System Full Access
18 - System Read and Write Access; A4 D" S1 l- @& ~- c8 I' P
19 - System Read Access; j: N9 n7 X- p9 I% E
20 - Administrators Read, Write and Execute Access! V/ X4 l* F. K; w& Y" ]. m: F3 s
21 - Interactive User Full Access
22 - Interactive User Read and Write Access/ S. G. b% a* U$ D2 ]
23 - Interactive User Read, Write and Delete Access* U1 S/ n1 j% M* }5 z
8 h0 g' [% o5 i8 Y+ Q+ ~6 C
| 欢迎光临 【3.A.S.T】网络安全爱好者 (http://www.3ast.com/) | Powered by Discuz! 7.2 |