Windows 7

  1. InFileList - comma separated list of Certificate or CRL files to modify and re-sign SerialNumber - Serial number of certificate ...
  2. InFileList|SerialNumber|%1 OutFileList StartDate+%9 +SerialNumberList | -SerialNumberList | -ObjectIdList | @ExtensionFile ...
  3. InfoName - indicates the CA property to display (see below) Use "*" for all properties Index - optional zero-based property ...
  4. Information about an individual's finances, including account status, account balance, payment or overdraft history, and ...
  5. Information about an individual's physical or mental health, sexual orientation, use of or inquiry into health care services ...
  6. Information about certificate templates can only be read from a domain controller. A domain controller cannot be located ...
  7. Information about membership in or affiliation with groups such as religious organizations, trade unions, professional associations, ...
  8. Information about the computer system that the individual is using to access the Internet, such as the IP number, domain ...
  9. Information about the MSDTC resource has not been configured correctly in the shared cluster registry. Error Specifics: %1%0 ...
  10. Information about the shared folder cannot be retrieved. This error can occur if the shared folder does not use the Common ...
  11. Information for this content class was not found. Use the default content class. This error is obsolete and should no longer ...
  12. Information for this object is not currently available possibly due to a network or Active Directory Domain Controller failure. ...
  13. Information from the primary domain controller (PDC) for the domain %2 cannot be obtained because: %1 Make sure that the ...
  14. Information generated by browsing the Web site, such as which pages are visited, and how long an individual stays on each ...
  15. Information generated from or reflecting explicit interactions with the Web site, such as queries to a search engine, or ...
  16. Information is no longer available about this task because the object that monitors the progress no longer exists. This may ...
  17. Information is retained beyond the time it takes to complete the stated purpose because of a legal requirement or liability. ...
  18. Information may be archived or stored for the purpose of preserving social history as governed by an existing law or policy. ...
  19. Information may be used by the Web site to complete the activity for which it was provided, whether the activity is a one-time ...
  20. Information may be used for the technical support of the Web site and its computer system. For example, to process computer ...
  21. Information may be used to contact an individual, through a communications channel other than voice telephone, for the promotion ...
  22. Information may be used to tailor or modify the content or design of the Web site during a single visit to the site. For ...
  23. Information regarding the validation of the server URI will be presented below. Ensure that the properties returned from ...
  24. Information that allows an individual to be contacted or located in the physical world, such as a telephone number or a postal ...
  25. Information that allows an individual to be contacted or located on the Internet, such as an e-mail address. Often, this ...
  26. Information that can be linked to an individual may be used for research, analysis, and reporting. For example, data about ...
  27. Information that can be linked to an individual may be used to make a decision that directly affects that individual. For ...
  28. Information that is based upon a unique identifier but that cannot be linked an individual may be used to make a decision ...
  29. Information that is based upon a unique identifier but that cannot be linked to an individual may be used for research, analysis, ...
  30. Information you exchange with this site cannot be viewed or changed by others. However, there are the following problems ...
  31. Information you exchange with this site cannot be viewed or changed by others. However, there is problem with the site's ...
  32. Information, such as global positioning data, that can be used to identify an individual's current physical location and ...
  33. Informational callback to request complete. (PendingCount %2) (InformationRoutine %3) (InformationContext %4) (Type %5) (Information ...
  34. Infrared Camera Service (IrTran-P) received only part of a picture file before the transmission from the camera ended. The ...
  35. Infrared Camera Support (IrTran-P) failed to start listening on the IrCOMM port. This is probably because another application ...
  36. Ini File policy allows an administrator to configure ini file settings in any type of ini file. Ini files are widely used ...
  37. Initial connection to Bluetooth HID device %2 failed. The device has been removed as a personal or paired device. You must ...
  38. Initialization commands may lead to the exposure of sensitive information in the modem log. Consult your modem's instruction ...
  39. Initialization could not complete because the minimum number of connections required to initialize the Ldap connection pool ...
  40. Initialization failed because of a system execution failure on path %1. There is not enough memory to start the process. ...
  41. Initialization failed because the driver device could not be created. Use the string "%2" to identify the interface for which ...
  42. Initialization of the High Precision Event Timer failed due to a BIOS configuration problem. The operating system will use ...
  43. Initialization of the High Precision Event Timer failed due to an interrupt configuration problem. The operating system will ...
  44. Initialization of the High Precision Event Timer failed due to unsupported hardware. The operating system will use another ...
  45. Initialization parameters controlling resource usage other than net buffers are sized so that too much memory is needed. ...
  46. InitializePrintProvider failed for provider %1. This can occur because of system instability or a lack of system resources. ...
  47. InitializeProvider cannot allocate memory for %1. This can occur because of system instability or a lack of system resources. ...
  48. InitializeSecurityContext - Credential Handle(%2:%3) Context Handle (%4:%5) (Hostname %6) (InputFlags %7) (Buffer %8 %9/%10]) ...
  49. InitializeSecurityContext returned - (%14) Credential Handle(%2:%3) Context Handle (%4:%5) (OutputFlags %11) (Buffer %8 %9/%10]) ...
  50. Initiate scan to update quota usage. The syntax for this command is: Dirquota Quota Scan /Path:PATH /Remote:REMOTE /Path:PATH ...
  51. Initiates a new transaction and returns an MSMQ transaction object representing the new underlying transaction object created ...
  52. Initiator CHAP secret given is invalid. Maximum size of CHAP secret is 16 bytes. Minimum size is 12 bytes if IPSec is not ...
  53. Initiator CHAP secret is smaller than the minimum size (12 bytes) required by the spec. Dump data contains the given CHAP ...
  54. Initiator could not find a match for the initiator task tag in the received PDU. Dump data contains the entire iSCSI header. ...
  55. Injury, torture, killing or blood and dismemberment of fantasy characters in any context. That of humans or animals in artistic, ...
  56. Injury, torture, killing or blood and dismemberment of fantasy characters only in artistic, medical, educational, sports ...
  57. Ink is not working on your computer right now. Restart your computer, and then try again. If you still have this problem, ...
  58. Ink Support provides support for the use of a pen/stylus, including pen flicks support and application programming interfaces ...
  59. Inpass, Qmpfs, Soft and Qmsec options are not valid for the Permit or Block type FilterAction. 'action = negotiate' needs ...
  60. InPrivate Browsing helps prevent Internet Explorer from storing data about your browsing session. This includes cookies, ...
  61. InPrivate Browsing helps prevent Internet Explorer from storing data about your browsing session. This includes cookies, ...
  62. InPrivate Filtering helps you control which providers receive information about the websites you visit. If you choose to ...
  63. Input file: %1!s! Output file: %2!s! Filter: %3!s! Overwrite: %4!s! RetainCorrelationEvents: %5!s! RetainPII: %6!s! RetainGlobalEvents: ...
  64. Input Panel automatically converts your ink to text as you are writing. You can adjust the settings for how this happens. ...
  65. Input Panel can't run on a computer that you're connecting to remotely. Try running Input Panel on your local computer instead. ...
  66. Insert a blank, formatted disk into the drive you want to use, and then select that drive from the list below. I want to ...
  67. Insert a compatible SIM in the mobile broadband device There is no SIM in the device or it is blocked by a PIN unblock key ...
  68. Insert a new disc %3 is needed to copy these files. %1 is full. Please insert a new disc to continue copying these files. ...
  69. Insert the media with the following label into %2!s! %1!s! You can use a blank media or current media in the drive %2!s! ...
  70. Insert the password reset disk into the drive you want to use, and then select that drive from the list below. The password ...
  71. Insert the product's first installation floppy disk or CD-ROM, and then click Next. The application will be installed in ...
  72. Inserts a picture of the clipboard contents into your document. The picture is linked to the source file so that changes ...
  73. Inserts a picture of the file contents into your document. The picture will be linked to the file so that changes to the ...
  74. Inserts a shortcut which points to the location of the clipboard contents. The shortcut is linked to the source file so that ...
  75. Inserts a shortcut which represents the file. The shortcut will be linked to the file so that changes to the file will be ...