Windows 8.1

  1. IGMP Statistics for %1!s! Interface - Interface name %2!s! IP Address %3!s! Type %4!s! Interface State %5!s! Querier State ...
  2. IGMP Statistics for Proxy Interface - Interface name %1!s! IP Address %2!s! Type %3!s! State %4!s! Current Group Memberships ...
  3. IGMP was unable to send a packet from the interface with IP address %1 to the IP address %2. The data is the error code. ...
  4. Igmpv2 detected an error on the local interface with IP address %1. The error occurred while the interface was receiving ...
  5. Igmpv2 was unable to request notification of events on the socket for the local interface with IP address %1. The data is ...
  6. IKE failed to find valid machine certificate. Contact your Network Security Administrator about installing a valid certificate ...
  7. IKE negotiation failed because the machine certificate used does not have a private key. IPsec certificates require a private ...
  8. IKE security association establishment failed because peer could not authenticate. The certificate trust could not be established. ...
  9. IKE security association establishment failed because peer sent invalid proposal. Mode: %1 Filter: %2 Attribute: %3 Expected ...
  10. IKE security association negotiation failed. Mode: %1 Filter: %2 Peer Identity: %3 Failure Point: %4 Failure Reason: %5 Extra ...
  11. IKEv1 Main Mode Negotiation Time is the number of milliseconds taken for the last IKEv1 main mode security association negotiated. ...
  12. IKEv1 Quick Mode Negotiation Time is the number of milliseconds taken for the last IKEv1 quick mode security association ...
  13. IKEv2 Main Mode Negotiation Time is the number of milliseconds taken for the last IKEv2 main mode security association negotiated. ...
  14. IKEv2 Quick Mode Negotiation Time is the number of milliseconds taken for the last IKEv2 quick mode security association ...
  15. Illegal network control block (NCB) buffer length on SEND DATAGRAM, SEND BROADCAST, ADAPTER STATUS, or SESSION STATUS. The ...
  16. Illegal System DLL Relocation} The system DLL %hs was relocated in memory. The application will not run properly. The relocation ...
  17. Illegal System DLL Relocation} The system DLL %hs was relocated in memory. The application will not run properly. The relocation ...
  18. Image download is complete for a single URL: notification id %1], resource id %2], local path %3], error code %4], flags ...
  19. Image reference "%s": The image "%s" defines both Scale and TargetSize qualifiers; only one qualifier can be defined at a ...
  20. Image reference "%s": The image "%s" has an ABGR value " X" at position (%d, %d) that is not valid for a high-contrast white ...
  21. Image reference "%s": The image "%s" has an ABGR value " X" at position (%d, %d) that is not valid. The pixel must be white ...
  22. Image reference "%s": The image must define at least one variant without a TargetSize qualifier. It must define a Scale qualifier ...
  23. Image Relocated} An image file could not be mapped at the address specified in the image file. Local fixups must be performed ...
  24. Image Relocated} An image file was mapped at a different address from the one specified in the image file but fixups will ...
  25. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  26. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  27. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  28. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  29. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  30. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  31. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  32. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  33. Image Space is the virtual address space in use by the selected image with this protection. Executable memory is memory that ...
  34. Image Space is the virtual address space in use by the selected image with this protection. Execute Write Copy is memory ...
  35. Image Space is the virtual address space in use by the selected image with this protection. Execute/Read Only memory is memory ...
  36. Image Space is the virtual address space in use by the selected image with this protection. Execute/Read/Write memory is ...
  37. Image Space is the virtual address space in use by the selected image with this protection. No Access protection prevents ...
  38. Image Space is the virtual address space in use by the selected image with this protection. Read Only protection prevents ...
  39. Image Space is the virtual address space in use by the selected image with this protection. Read/Write protection allows ...
  40. Image Space is the virtual address space in use by the selected image with this protection. Write Copy protection is used ...
  41. image`i`*`Specifies the provider image path. The matching PDB will be located in the Symbol Server. Multiple paths can be ...
  42. IMAP servers can be accessed by multiple e-mail programs at the same time. If you are using two programs to access your mail ...
  43. Immediate steps Because a disk failure will cause you to lose all programs, files and documents on the disk, you should back ...
  44. Impersonate a client after authentication Assigning this privilege to a user allows programs running on behalf of that user ...
  45. Implement an RFC2307-based identity mapping solution such as Active Directory Domain Services (AD DS), Active Directory Lightweight ...
  46. Implements stealth-mode filtering by silently dropping all incoming packets for which TCP does not have a listening endpoint. ...
  47. Implements the File Server Resource Manager protocol for management of storage resources. It controls the management of quotas, ...
  48. Implements the File Server Resource Manager protocol for management of storage resources. It controls the management of quotas, ...
  49. Implements the SMB 1.x (CIFS) protocol. This protocol provides connectivity to network resources on pre-Windows Vista servers ...
  50. Import a trusted user domain from file {0} with the display name being set to "{1}" and the flag of trusting AD federated ...
  51. Import failed because a virtual machine with the same identifier already exists. Select a new identifier and try the import ...
  52. Import failed because the import was called from a different WMI namespace then the export file was generated from. Call ...
  53. Import failed because the source file '%1' and the destination file '%2' are different file types. Please check the order ...
  54. Import failed because the source path is not specified for destination resource path '%1'. Please try to run the import again ...
  55. Import failed to configure network connection for network card '%1'. You must modify the connection of all affected network ...
  56. Import failed. Number of parameters supplied for resource paths are not consistent. You should have a SourceResourcePath ...
  57. Import failed. Unable to find virtual machine import files under location '%1'. You can import a virtual machine only if ...
  58. Import failed. Unable to search import files under location '%3'. Error: %1 (%2). You can import a virtual machine only if ...
  59. Import failed. You need to have admin rights to import this Virtual machine since AllowFullScsiCommandSet property is set ...
  60. Import file groups from a file. The syntax of this command is: Filescrn Filegroup Import /File:PATH /Filegroup:FG_NAME | ...
  61. Import from backup is successful. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source GPO:%r ...
  62. Import from backup is successful. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source Template:%r ...
  63. IMPORT Import a transportable shadow copy set from a loaded metadata .cab file. Transportable shadow copies are not available ...
  64. Import of %1 address ranges is complete. %2 out of %3 objects successfully imported. %4 out of %3 objects failed to get imported. ...
  65. Import of %1 addresses is complete. %2 out of %3 objects successfully imported. %4 out of %3 objects failed to get imported. ...
  66. Import of %1 subnets is complete. %2 out of %3 objects successfully imported. %4 out of %3 objects failed to get imported. ...
  67. Import of backup failed. Error %1]. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source GPO:%r ...
  68. Import of backup failed. Error %1]. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source Template:%r ...
  69. Import templates from a file. The syntax of this command is: Dirquota Template Import /File:PATH /Template:TEMPLATE_NAME ...
  70. Import templates from a file. The syntax of this command is: Filescrn Template Import /File:PATH /Template:TEMPLATE_NAME ...
  71. Import the trusted publishing domain (.xml) file that contains the server licensor certificate, cluster key, and templates ...
  72. Import the trusted user domain (.bin) file that contains the server licensor certificate of the AD RMS cluster to be trusted. ...
  73. Important! Do not press OK until all transforms are added and ordered correctly. For more information, right-click on the ...
  74. IMPORTANT: "netsh firewall" is deprecated; use "netsh advfirewall firewall" instead. For more information on using "netsh ...
  75. IMPORTANT: A connection profile must be created on a computer that uses the same 32-bit or 64-bit processor architecture ...