Windows 10

  1. If your PC isn't running well, resetting it might help. This lets you choose to keep your files or remove them, and then ...
  2. If your phone company provided only one phone number and SPID for each ISDN line, select channel 1 for that line, and type ...
  3. If your phone company provided only one phone number for each ISDN line, select channel 1 for that line, and type the phone ...
  4. If your phone company provided only one subaddress and phone number for each ISDN line, select logical terminal 1 for that ...
  5. If your server is running Windows Server 2008 R2, in the Security Information section of Server Summary , click Configure ...
  6. If your server is running Windows Server 2012, click Configure this local server to open the Local Server configuration page. ...
  7. If your user names and passwords are lost, damaged, or destroyed then you can use this backup to restore them. You can also ...
  8. Ignoring UNC Hardening Configuration Entry: Unable to parse UNC Path. UNC Path: %2 UNC Hardening Configuration: %4 Guidance: ...
  9. Ignoring UNC Hardening Configuration Entry: Unsupported registry value type. Registry Value Path: %2@%4 Registry Value Type: ...
  10. Ignoring UNC Hardening Configuration Entry: Unsupported UNC Path. UNC Path: %2 UNC Hardening Configuration: %4 Guidance: ...
  11. Ignoring UNC Hardening Configuration Property: Unsupported property name. UNC Path: %2 UNC Hardening Configuration: %4 Property ...
  12. Ignoring UNC Hardening Configuration Property: Unsupported property name. UNC Path: %2 UNC Hardening Configuration: %4 Property ...
  13. Ignoring UNC Hardening Configuration Property: Unsupported property value. UNC Path: %2 UNC Hardening Configuration: %4 Property ...
  14. IKE failed to find valid machine certificate. Contact your Network Security Administrator about installing a valid certificate ...
  15. IKE negotiation failed because the machine certificate used does not have a private key. IPsec certificates require a private ...
  16. IKE security association establishment failed because peer could not authenticate. The certificate trust could not be established. ...
  17. IKE security association establishment failed because peer sent invalid proposal. Mode: %1 Filter: %2 Attribute: %3 Expected ...
  18. IKE security association negotiation failed. Mode: %1 Filter: %2 Peer Identity: %3 Failure Point: %4 Failure Reason: %5 Extra ...
  19. IKEv1 Main Mode Negotiation Time is the number of milliseconds taken for the last IKEv1 main mode security association negotiated. ...
  20. IKEv1 Quick Mode Negotiation Time is the number of milliseconds taken for the last IKEv1 quick mode security association ...
  21. IKEv2 Main Mode Negotiation Time is the number of milliseconds taken for the last IKEv2 main mode security association negotiated. ...
  22. IKEv2 Quick Mode Negotiation Time is the number of milliseconds taken for the last IKEv2 quick mode security association ...
  23. Illegal network control block (NCB) buffer length on SEND DATAGRAM, SEND BROADCAST, ADAPTER STATUS, or SESSION STATUS. The ...
  24. Illegal System DLL Relocation} The system DLL %hs was relocated in memory. The application will not run properly. The relocation ...
  25. Illegal System DLL Relocation} The system DLL %hs was relocated in memory. The application will not run properly. The relocation ...
  26. Image download is complete for a single URL: notification id %1], resource id %2], local path %3], error code %4], flags ...
  27. Image reference "%s": The image "%s" defines both Scale and TargetSize qualifiers; only one qualifier can be defined at a ...
  28. Image reference "%s": The image "%s" has an ABGR value " X" at position (%d, %d) that is not valid for a high-contrast white ...
  29. Image reference "%s": The image "%s" has an ABGR value " X" at position (%d, %d) that is not valid. The pixel must be white ...
  30. Image reference "%s": The image must define at least one variant without a TargetSize qualifier. It must define a Scale qualifier ...
  31. Image Relocated} An image file could not be mapped at the address specified in the image file. Local fixups must be performed ...
  32. Image Relocated} An image file was mapped at a different address from the one specified in the image file but fixups will ...
  33. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  34. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  35. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  36. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  37. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  38. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  39. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  40. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  41. Image Space is the virtual address space in use by the selected image with this protection. Executable memory is memory that ...
  42. Image Space is the virtual address space in use by the selected image with this protection. Execute Write Copy is memory ...
  43. Image Space is the virtual address space in use by the selected image with this protection. Execute/Read Only memory is memory ...
  44. Image Space is the virtual address space in use by the selected image with this protection. Execute/Read/Write memory is ...
  45. Image Space is the virtual address space in use by the selected image with this protection. No Access protection prevents ...
  46. Image Space is the virtual address space in use by the selected image with this protection. Read Only protection prevents ...
  47. Image Space is the virtual address space in use by the selected image with this protection. Read/Write protection allows ...
  48. Image Space is the virtual address space in use by the selected image with this protection. Write Copy protection is used ...
  49. image`i`*`Specifies the provider image path. The matching PDB will be located in the Symbol Server. Multiple paths can be ...
  50. Immediate steps Because a disk failure will cause you to lose all programs, files and documents on the disk, you should back ...
  51. Impersonate a client after authentication Assigning this privilege to a user allows programs running on behalf of that user ...
  52. Implements stealth-mode filtering by silently dropping all incoming packets for which TCP does not have a listening endpoint. ...
  53. Implements the File Server Resource Manager protocol for management of storage resources. It controls the management of quotas, ...
  54. Implements the SMB 1.x (CIFS) protocol. This protocol provides connectivity to network resources on pre-Windows Vista servers ...
  55. Import failed because a virtual machine with the same identifier already exists. Select a new identifier and try the import ...
  56. Import failed because the import was called from a different WMI namespace then the export file was generated from. Call ...
  57. Import failed because the source file '%1' and the destination file '%2' are different file types. Please check the order ...
  58. Import failed because the source path is not specified for destination resource path '%1'. Please try to run the import again ...
  59. Import failed to configure network connection for network card '%1'. You must modify the connection of all affected network ...
  60. Import failed. Number of parameters supplied for resource paths are not consistent. You should have a SourceResourcePath ...
  61. Import failed. Unable to find virtual machine import files under location '%1'. You can import a virtual machine only if ...
  62. Import failed. Unable to search import files under location '%3'. Error: %1 (%2). You can import a virtual machine only if ...
  63. Import failed. You need to have admin rights to import this Virtual machine since AllowFullScsiCommandSet property is set ...
  64. Important! Do not press OK until all transforms are added and ordered correctly. For more information, right-click on the ...
  65. IMPORTANT: "netsh firewall" is deprecated; use "netsh advfirewall firewall" instead. For more information on using "netsh ...
  66. Important: adding this website to the Trusted sites zone will lower the security settings for all content from this web site ...
  67. Important: adding this website to the Trusted sites zone, will lower the security settings for all content from this website ...
  68. Important: After the upgrade is finished, remove the external drive and keep it in a safe place. You'll need this drive if ...
  69. IMPORTANT: Command executed successfully. However, "netsh firewall" is deprecated; use "netsh advfirewall firewall" instead. ...
  70. Important: To prevent data loss, you must have a way to recover BitLocker encryption keys. If you do not allow both recovery ...
  71. Importing a policy will overwrite all of the current Windows Firewall with Advanced Security policy. If you wish to save ...
  72. Importing policies may take several minutes or longer. Canceling this process or closing this program before import finishes ...
  73. Importing this list will replace your old list. Additionally, importing malicious Allow/Block lists can effectively disable ...
  74. Imports a foreign disk group into the local computer's online disk group. Syntax: IMPORT NOERR NOERR For scripting only. ...
  75. Impression Id: %1{ImpressionId}. %2{AttributeName} attribute in namespace %3{Namespace} with value %4{Value} encountered ...