Windows 8.1
- IGMP Statistics for %1!s! Interface - Interface name %2!s! IP Address %3!s! Type %4!s! Interface State %5!s! Querier State ...
- IGMP Statistics for Proxy Interface - Interface name %1!s! IP Address %2!s! Type %3!s! State %4!s! Current Group Memberships ...
- IGMP was unable to send a packet from the interface with IP address %1 to the IP address %2. The data is the error code. ...
- Igmpv2 detected an error on the local interface with IP address %1. The error occurred while the interface was receiving ...
- Igmpv2 was unable to request notification of events on the socket for the local interface with IP address %1. The data is ...
- IKE failed to find valid machine certificate. Contact your Network Security Administrator about installing a valid certificate ...
- IKE negotiation failed because the machine certificate used does not have a private key. IPsec certificates require a private ...
- IKE security association establishment failed because peer could not authenticate. The certificate trust could not be established. ...
- IKE security association establishment failed because peer sent invalid proposal. Mode: %1 Filter: %2 Attribute: %3 Expected ...
- IKE security association negotiation failed. Mode: %1 Filter: %2 Peer Identity: %3 Failure Point: %4 Failure Reason: %5 Extra ...
- IKEv1 Main Mode Negotiation Time is the number of milliseconds taken for the last IKEv1 main mode security association negotiated. ...
- IKEv1 Quick Mode Negotiation Time is the number of milliseconds taken for the last IKEv1 quick mode security association ...
- IKEv2 Main Mode Negotiation Time is the number of milliseconds taken for the last IKEv2 main mode security association negotiated. ...
- IKEv2 Quick Mode Negotiation Time is the number of milliseconds taken for the last IKEv2 quick mode security association ...
- Illegal network control block (NCB) buffer length on SEND DATAGRAM, SEND BROADCAST, ADAPTER STATUS, or SESSION STATUS. The ...
- Illegal System DLL Relocation} The system DLL %hs was relocated in memory. The application will not run properly. The relocation ...
- Illegal System DLL Relocation} The system DLL %hs was relocated in memory. The application will not run properly. The relocation ...
- Image download is complete for a single URL: notification id %1], resource id %2], local path %3], error code %4], flags ...
- Image reference "%s": The image "%s" defines both Scale and TargetSize qualifiers; only one qualifier can be defined at a ...
- Image reference "%s": The image "%s" has an ABGR value " X" at position (%d, %d) that is not valid for a high-contrast white ...
- Image reference "%s": The image "%s" has an ABGR value " X" at position (%d, %d) that is not valid. The pixel must be white ...
- Image reference "%s": The image must define at least one variant without a TargetSize qualifier. It must define a Scale qualifier ...
- Image Relocated} An image file could not be mapped at the address specified in the image file. Local fixups must be performed ...
- Image Relocated} An image file was mapped at a different address from the one specified in the image file but fixups will ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the selected image with this protection. Executable memory is memory that ...
- Image Space is the virtual address space in use by the selected image with this protection. Execute Write Copy is memory ...
- Image Space is the virtual address space in use by the selected image with this protection. Execute/Read Only memory is memory ...
- Image Space is the virtual address space in use by the selected image with this protection. Execute/Read/Write memory is ...
- Image Space is the virtual address space in use by the selected image with this protection. No Access protection prevents ...
- Image Space is the virtual address space in use by the selected image with this protection. Read Only protection prevents ...
- Image Space is the virtual address space in use by the selected image with this protection. Read/Write protection allows ...
- Image Space is the virtual address space in use by the selected image with this protection. Write Copy protection is used ...
- image`i`*`Specifies the provider image path. The matching PDB will be located in the Symbol Server. Multiple paths can be ...
- IMAP servers can be accessed by multiple e-mail programs at the same time. If you are using two programs to access your mail ...
- Immediate steps Because a disk failure will cause you to lose all programs, files and documents on the disk, you should back ...
- Impersonate a client after authentication Assigning this privilege to a user allows programs running on behalf of that user ...
- Implement an RFC2307-based identity mapping solution such as Active Directory Domain Services (AD DS), Active Directory Lightweight ...
- Implements stealth-mode filtering by silently dropping all incoming packets for which TCP does not have a listening endpoint. ...
- Implements the File Server Resource Manager protocol for management of storage resources. It controls the management of quotas, ...
- Implements the File Server Resource Manager protocol for management of storage resources. It controls the management of quotas, ...
- Implements the SMB 1.x (CIFS) protocol. This protocol provides connectivity to network resources on pre-Windows Vista servers ...
- Import a trusted user domain from file {0} with the display name being set to "{1}" and the flag of trusting AD federated ...
- Import failed because a virtual machine with the same identifier already exists. Select a new identifier and try the import ...
- Import failed because the import was called from a different WMI namespace then the export file was generated from. Call ...
- Import failed because the source file '%1' and the destination file '%2' are different file types. Please check the order ...
- Import failed because the source path is not specified for destination resource path '%1'. Please try to run the import again ...
- Import failed to configure network connection for network card '%1'. You must modify the connection of all affected network ...
- Import failed. Number of parameters supplied for resource paths are not consistent. You should have a SourceResourcePath ...
- Import failed. Unable to find virtual machine import files under location '%1'. You can import a virtual machine only if ...
- Import failed. Unable to search import files under location '%3'. Error: %1 (%2). You can import a virtual machine only if ...
- Import failed. You need to have admin rights to import this Virtual machine since AllowFullScsiCommandSet property is set ...
- Import file groups from a file. The syntax of this command is: Filescrn Filegroup Import /File:PATH /Filegroup:FG_NAME | ...
- Import from backup is successful. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source GPO:%r ...
- Import from backup is successful. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source Template:%r ...
- IMPORT Import a transportable shadow copy set from a loaded metadata .cab file. Transportable shadow copies are not available ...
- Import of %1 address ranges is complete. %2 out of %3 objects successfully imported. %4 out of %3 objects failed to get imported. ...
- Import of %1 addresses is complete. %2 out of %3 objects successfully imported. %4 out of %3 objects failed to get imported. ...
- Import of %1 subnets is complete. %2 out of %3 objects successfully imported. %4 out of %3 objects failed to get imported. ...
- Import of backup failed. Error %1]. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source GPO:%r ...
- Import of backup failed. Error %1]. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source Template:%r ...
- Import templates from a file. The syntax of this command is: Dirquota Template Import /File:PATH /Template:TEMPLATE_NAME ...
- Import templates from a file. The syntax of this command is: Filescrn Template Import /File:PATH /Template:TEMPLATE_NAME ...
- Import the trusted publishing domain (.xml) file that contains the server licensor certificate, cluster key, and templates ...
- Import the trusted user domain (.bin) file that contains the server licensor certificate of the AD RMS cluster to be trusted. ...
- Important! Do not press OK until all transforms are added and ordered correctly. For more information, right-click on the ...
- IMPORTANT: "netsh firewall" is deprecated; use "netsh advfirewall firewall" instead. For more information on using "netsh ...
- IMPORTANT: A connection profile must be created on a computer that uses the same 32-bit or 64-bit processor architecture ...