Windows 8.1

  1. Information you exchange with this site cannot be viewed or changed by others. However, there is problem with the site's ...
  2. Information, such as global positioning data, that can be used to identify an individual's current physical location and ...
  3. Informational callback to request complete. (PendingCount %2) (InformationRoutine %3) (InformationContext %4) (Type %5) (Information ...
  4. Infrared Camera Service (IrTran-P) received only part of a picture file before the transmission from the camera ended. The ...
  5. Infrared Camera Support (IrTran-P) failed to start listening on the IrCOMM port. This is probably because another application ...
  6. Ini File policy allows an administrator to configure ini file settings in any type of ini file. Ini files are widely used ...
  7. Initial connection to Bluetooth HID device %2 failed. The device has been removed as a personal or paired device. You must ...
  8. Initial replication deleted file %3 for Replica virtual machine '%1' to complete initial replication. (Virtual machine ID ...
  9. Initial replication has not completed yet. The virtual machine '%1' will be ready for failover after initial replication. ...
  10. Initialization commands may lead to the exposure of sensitive information in the modem log. Consult your modem's instruction ...
  11. Initialization could not complete because the minimum number of connections required to initialize the Ldap connection pool ...
  12. Initialization failed because of a system execution failure on path %1. There is not enough memory to start the process. ...
  13. Initialization failed because the driver device could not be created. Use the string "%2" to identify the interface for which ...
  14. Initialization of the High Precision Event Timer failed due to a BIOS configuration problem. The operating system will use ...
  15. Initialization of the High Precision Event Timer failed due to an interrupt configuration problem. The operating system will ...
  16. Initialization of the High Precision Event Timer failed due to unsupported hardware. The operating system will use another ...
  17. Initialization parameters controlling resource usage other than net buffers are sized so that too much memory is needed. ...
  18. InitializePrintProvider failed for provider %1. This can occur because of system instability or a lack of system resources. ...
  19. InitializeProvider cannot allocate memory for %1. This can occur because of system instability or a lack of system resources. ...
  20. Initializes the Storage Tiers Management service when the first tiered storage space is detected on the system. Do not remove ...
  21. InitializeSecurityContext - Credential Handle(%2:%3) Context Handle (%4:%5) (Hostname %6) (InputFlags %7) (Buffer %8 %9/%10]) ...
  22. InitializeSecurityContext returned - (%14) Credential Handle(%2:%3) Context Handle (%4:%5) (OutputFlags %11) (Buffer %8 %9/%10]) ...
  23. Initiate rollover for the signing key %1 for the zone %2 on server %3. This is not a reversible action. Do you want to continue? ...
  24. Initiate scan to update quota usage. The syntax for this command is: Dirquota Quota Scan /Path:PATH /Remote:REMOTE /Path:PATH ...
  25. Initiator CHAP secret given is invalid. Maximum size of CHAP secret is 16 bytes. Minimum size is 12 bytes if IPSec is not ...
  26. Initiator CHAP secret is smaller than the minimum size (12 bytes) required by the spec. Dump data contains the given CHAP ...
  27. Initiator could not find a match for the initiator task tag in the received PDU. Dump data contains the entire iSCSI header. ...
  28. Initiator/Target combinations that belong to the same storage group (masking set) will be selected or deselected together. ...
  29. Injury, torture, killing or blood and dismemberment of fantasy characters in any context. That of humans or animals in artistic, ...
  30. Injury, torture, killing or blood and dismemberment of fantasy characters only in artistic, medical, educational, sports ...
  31. Ink and Handwriting Services includes Ink Support and Handwriting Recognition. Ink Support provides pen/stylus support, including ...
  32. Ink is not working on your computer right now. Restart your computer, and then try again. If you still have this problem, ...
  33. Ink Support provides pen/stylus support, including pen flicks support and application programming interfaces (APIs) for calling ...
  34. Inpass, Qmpfs, Soft and Qmsec options are not valid for the Permit or Block type FilterAction. 'action = negotiate' needs ...
  35. InPrivate Browsing helps prevent Internet Explorer from storing data about your browsing session. This includes cookies, ...
  36. InPrivate Browsing helps prevent Internet Explorer from storing data about your browsing session. This includes cookies, ...
  37. InPrivate Browsing helps prevent Internet Explorer from storing data about your browsing session. This includes cookies, ...
  38. InPrivate Browsing helps prevent Internet Explorer from storing data about your browsing session. This includes cookies, ...
  39. Input dsset file could not be opened. Please verify the specified path and ensure that a fully qualified path name is given. ...
  40. Input file: %1!s! Output file: %2!s! Filter: %3!s! Overwrite: %4!s! RetainCorrelationEvents: %5!s! RetainPII: %6!s! RetainGlobalEvents: ...
  41. Input keyset file could not be opened. Please verify the specified path and ensure that a fully qualified path name is given. ...
  42. Input Panel automatically converts your ink to text as you are writing. You can adjust the settings for how this happens. ...
  43. Input Panel can't run on a computer that you're connecting to remotely. Try running Input Panel on your local computer instead. ...
  44. InputObject for resource record has an invalid value. Failed to add the resource record on %1 server. Please check extended ...
  45. InputObject for resource record has an invalid value. Failed to remove the resource record on %1 server. Please check extended ...
  46. Insert a blank, formatted disk into the drive you want to use, and then select that drive from the list below. I want to ...
  47. Insert a compatible SIM in the mobile broadband device There is no SIM in the device or it is blocked by a PIN unblock key ...
  48. Insert a new storage device %3 is needed to copy these files. %2 is full. Please insert a new storage device to continue ...
  49. Insert data chunk body to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorrupted %6, DataSize %7) ...
  50. Insert data chunk header to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorupted %6, DataSize %7) ...
  51. Insert hotspot chunk body to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorrupted %6, DataSize ...
  52. Insert hotspot chunk header to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorrupted %6, DataSize ...
  53. Insert padding chunk body to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorrupted %6, DataSize ...
  54. Insert padding chunk header to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorupted %6, DataSize ...
  55. Insert stream map chunk body to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorrupted %6, DataSize ...
  56. Insert stream map chunk header to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorrupted %6, DataSize ...
  57. Insert the media with the following label into %2!s! %1!s! You can use a blank media or current media in the drive %2!s! ...
  58. Insert the password reset disk into the drive you want to use, and then select that drive from the list below. The password ...
  59. Insert the product's first installation floppy disk or CD-ROM, and then click Next. The application will be installed in ...
  60. Inserts a picture of the clipboard contents into your document. The picture is linked to the source file so that changes ...
  61. Inserts a picture of the file contents into your document. The picture will be linked to the file so that changes to the ...
  62. Inserts a shortcut which points to the location of the clipboard contents. The shortcut is linked to the source file so that ...
  63. Inserts a shortcut which represents the file. The shortcut will be linked to the file so that changes to the file will be ...
  64. Inserts the contents of the clipboard into your document as %s. The data is linked to the source file so that changes to ...
  65. Inserts the contents of the clipboard into your document so that you may activate it using %s. It will be displayed as an ...
  66. Inserts the contents of the file as an object into your document so that you may activate it using the program which created ...
  67. Inserts the contents of the file as an object into your document so that you may activate it using the program which created ...
  68. Inserts the path to a file that contains all the files that were acted upon during the running of a file management task. ...
  69. InspectVhdDialog.exe ServerName - Specifies the computer where the virtual hard disk is located. VhdPath - Specifies the ...
  70. InspectVhdDialog6.2.exe ServerName - Specifies the computer where the virtual hard disk is located. VhdPath - Specifies the ...
  71. Install a driver for your network adapter Windows did not detect a properly installed network adapter. If you have a network ...
  72. Install a driver for your wireless network adapter Windows did not detect a properly installed wireless network adapter. ...
  73. Install a driver Locate and install a driver for a device that is attached to the computer but is not in the list of available ...
  74. Install event publishers and logs from manifest. Usage: wevtutil { im | install-manifest } /OPTION:VALUE /OPTION:VALUE . ...
  75. install FSRM service on all cluster nodes or remove FSRM service from all cluster nodes if you don't want to use FSRM in ...