Windows 8.1

  1. It is recommended to have at least a minimum of 300 MB free on your Windows volume to ensure system reliability. To free ...
  2. It looks like something didn't load correctly. Restarting might fix the problem. If this happens more than once, you might ...
  3. It may be necessary to specify /REUSE when running djoin.exe again with the same machine name. Computer provisioning failed: ...
  4. It may take several minutes to create this index. If you cancel, the index may be incomplete. Some links between topics and ...
  5. It took %1 seconds to write a change file to the BITS job list. If this is excessive, the number of BITS jobs may be larger ...
  6. It typically takes up to an hour for your changes to replicate across the Internet. In some cases, it can take longer. To ...
  7. It was determined that your messages are stored in the following location. If this is not the correct location or you would ...
  8. It was not possible to complete Setup, because the upgrade server was not available. Windows Media Player was not installed. ...
  9. It was not possible to complete Setup; Windows Media Player was not installed. Restart Windows and then run Windows Media ...
  10. It was not possible to establish a connection to the media server in a timely manner. The media server may be down for maintenance, ...
  11. It was not possible to establish a connection to the proxy server in a timely manner. Please check your proxy server configuration.%0 ...
  12. It will take a few minutes for the recognizer to be personalized with your handwriting samples. A notification appears when ...
  13. It's easy to read messages using the preview pane . Select a message, then look below to see the text of the message in the ...
  14. It's time to enter the product key. It should be on the back of the box that Windows 8.1 came in or in a message that confirms ...
  15. It's time to enter the product key. Look for it on the box that your Windows DVD came in, in an email that shows that you ...
  16. Items detected on your PC require further analysis. By Sending the files listed below, you can help Microsoft analysts determine ...
  17. Items in the list below will never be filtered into your Junk Mail folder. To add, remove or modify an item in the list, ...
  18. Items will not be backed up unless the folders are available. One or more of the items selected to be backed up were not ...
  19. ITextRangeProvider for EDIT Control is out of sync with current text buffer. Text Ranges should be discarded when a TextChanged ...
  20. IXFR TCP Success Received is the total number of successful TCP incremental zone transfers received by the secondary DNS ...
  21. IXFR UDP Success Received is the total number of successful UDP incremental zone transfers received by the secondary DNS ...
  22. JavaScript is disabled for your web browser. To use all the Remote Web Access features, enable JavaScript for your web browser. ...
  23. Jaws 4.5 has a known compatibility issue with this version of Windows and might not run as expected. To use this application, ...
  24. JetTerm2() cannot shutdown cleanly. Some ESE security databases may not be consistent and cannot be moved anywhere. Scesrv ...
  25. Job %1 : Attempting to get the action from pull server using Download Manager %2. Configuration Id is %3. Checksum is %4. ...
  26. Job %1 : Attempting to get the modules from pull server using Download Manager %2. Configuration Id is %3. Modules are %4. ...
  27. Job %1 : Method %2 started with parameters Class name: %3 Resource ID: %4 Flags: %5 Execution Mode: %6 Provider Namespace: ...
  28. Job %1 : This event indicates that a non-terminating error was thrown when %2 was executing %3 on %4 provider. FullyQualifiedErrorId ...
  29. Job %1 : This event indicates that failure happened while trying to run consistency engine. ErrorId is %2. ErrorDetail is ...
  30. Job %1 : This event indicates that failure happens when %2 is processing the configuration. ErrorId is %3. ErrorDetail is ...
  31. Job %1 : This event indicates that failure happens when %2 is trying to get the configuration from pull server using download ...
  32. Job cannot be transferred because job transfer cost policy preventing it. job: %1, jobID: %2, filecount: %3, jobs transfer ...
  33. job has completed. Volume: %4 (%3) Error code: %5 Error message: %6 Savings rate: %7 Saved space: %8 Volume used space: %9 ...
  34. job on volume %4 (%3) was configured with insufficient memory. System memory percentage: %5 Available memory: %8 MB Minimum ...
  35. JobState is an integer enumeration that indicates the operational state of a Job. It can also indicate transitions between ...
  36. Join the Customer Experience Improvement Program and help improve Microsoft software and services. If you choose to join, ...
  37. Joiner tried to Create Security Context using Package='%1' with Context Requirement ='%2' and Timeout ='%3' for the target ...
  38. Joining a homegroup makes it easy to get to files and devices shared by other people on this network. Go to PC settings to ...
  39. Journal Note Writer cannot be used because it has been prevented by a software restriction policy. For more information please ...
  40. Junk E-mail filtering support is currently off. To access your Junk E-mail options, go to Message/Junk E-mail/Junk E-mail ...
  41. KDC Proxy Server service runs on edge servers to proxy Kerberos protocol messages to domain controllers on the corporate ...
  42. Keeping the Internet Explorer Enhanced Security Configuration enabled on your servers is recommended to help ensure that ...
  43. Kerberos Authentication Service This policy setting allows you to audit events generated by Kerberos authentication ticket-granting ...
  44. Kerberos Error. Check that the system time between the two servers is sufficiently. close. Also check that the time service ...
  45. Kerberos Error. It appears that server %1 has a stale DNS entry for %3. This is causing %2 to be unable to replicate with ...
  46. Kerberos Error. The machine account is not present, or does not match on the. destination, source or KDC servers. Verify ...
  47. Kerberos is valid only when this rule is enabled on a computer which is a member of a domain. This computer is not a member ...
  48. Kerberos Policy Changed: Changed By: User Name: %1 Domain Name: %2 Logon ID: %3 Changes made: ('-' means no changes, otherwise ...
  49. Kerberos policy was changed. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Changes Made: ('-' ...
  50. Kerberos pre-authentication failed. Account Information: Security ID: %2 Account Name: %1 Service Information: Service Name: ...
  51. Kerberos preauthentication by using DES or RC4 failed because the account was a member of the Protected User group. Account ...
  52. Kerberos preauthentication by using DES or RC4 failed because the account was a member of the Protected User group. Account ...
  53. Kerberos preauthentication by using DES or RC4 failed because the account was a member of the Protected User group. Account ...
  54. Kerberos proxy authentication is not supported in a multisite deployment. You must enable the use of computer certificates ...
  55. Kerberos Service Ticket Operations This policy setting allows you to audit events generated by Kerberos authentication ticket-granting ...
  56. Kernel Object This policy setting allows you to audit attempts to access the kernel, which include mutexes and semaphores. ...
  57. Key access denied by Microsoft key distribution service. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ...
  58. Key archival is only enabled for future certificates. Keys for certificates that are already issued will not be archived. ...
  59. Key archival is only enabled for future certificates. Keys for certificates that are already issued will not be archived. ...
  60. Key based renewal requires subject information to be provided within the request. Removing this option will disable key based ...
  61. Key did not install, because a network error occurred. The key could not be activated. Verify network connectivity and try ...
  62. Key did not install, because a proxy error occurred. The key could not be activated. Verify that the proxy services are running ...
  63. Key did not install, because the key entered has exceeded the maximum number of activations. Use a different key. Error: ...
  64. Key did not install, because the key entered is not a key authorized for installation on this edition. Use a different key. ...
  65. Key did not install, because the key is activated, but an error occurred in local configuration. To continue, request a new ...
  66. Key did not install, because the key that was entered is blocked. It cannot be activated. Use a different key. Error: 0x ...
  67. Key did not install, because this user account does not have sufficient permissions to install this key. Log on with a user ...
  68. Key file operation. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Cryptographic Parameters: Provider ...
  69. Key management services (KMS) host could not be located in domain name system (DNS), please have your system administrator ...
  70. Key migration operation. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Cryptographic Parameters: ...
  71. Key name specified more than once. Likely causes are: 1) the KEYNAME tag is defined multiple times in this category 2) this ...
  72. Key recovery certificate %1 is about to expire soon and will not be used upon expiration. Contact your adminstrator to renew ...
  73. Key-based renewal provides the ability for automatic certificate renewal for computers that are not connected directly to ...
  74. Key-based renewal provides the ability for automatic certificate renewal for computers that are not connected directly to ...
  75. KeyContainerName - key container name of the key to verify Defaults to machine keys. Use -user for user keys CACertFile - ...