Windows 7

  1. Prompts users for alternate logon credentials during network-based installations. This setting displays the "Install Program ...
  2. Propagation stopped because the propagation state for search server cannot be read. Try propagation again. If this error ...
  3. Properties for this program cannot be verified. Another program may be using the APPS.INF file. Close your other programs ...
  4. Properties for this program cannot be verified. The APPS.INF file is missing. Copy the APPS.INF file from your Windows Setup ...
  5. Properties you entered cannot be saved because the Data Link file is inaccessible. Ensure that the hard drive or network ...
  6. Property (%1) defined in schema has the Property ID (%2) which collides with property (%3) already defined. Ignoring the ...
  7. Property (%1) defined in schema is attempting to use Property ID (%2) which was already being used by another property. Update ...
  8. Property cache modification takes effect when Indexing Service is restarted. Only newly filtered documents will have the ...
  9. Property Store is not found in the indexer. The possible causes are that the call came during a catalog reset or that the ...
  10. PropertyName is a string property and is either DeleteTempFolders or UseTempFolders.They are flags that are either set to ...
  11. PropertyName is an enumeration of the properties: 0 = LPTPortMapping, 1 = COMPortMapping, 2 = AudioMapping, 3 = ClipboardMapping, ...
  12. PropertyName is an enumeration of the properties: 0 = SessionDirectoryLocation and 1 = SessionDirectoryClusterNamewhich are ...
  13. PropertyPolicy defines whether or not the non-null, non-key properties of the associated SettingData instance are treated ...
  14. Protect data from modification and preserve confidentiality on the network with these integrity and encryption algorithms. ...
  15. Protected content was recently transferred to this computer. Type the password for your user account on the old computer ...
  16. Protected Extensible Authentication Protocol (PEAP) is the authentication method used with wireless access points and authenticating ...
  17. Protected Mode Internet Explorer Shim - intercepts and elevates CreateProcess, WinExec, CoCreateInstance, CoGetClassObject. ...
  18. Protected Mode Internet Explorer Shim - intercepts save-to-file dialogs and prompts the user with an appropriate location. ...
  19. Protected Mode Internet Explorer Shim - intercepts save-to-file dialogs and prompts the user with the redirected low location. ...
  20. Protected mode is currently turned off for the %1!s!, %2!s!, %3!s! and %4!s! zones. Click here to open security settings. ...
  21. Protected mode protects Internet Explorer from exploited vulnerabilities by reducing the locations Internet Explorer can ...
  22. Protected Storage helps safeguard data you want to keep private. These details show which program is attempting to access ...
  23. Protecting your system allows you to undo unwanted system changes. Protecting your documents allows you to restore previous ...
  24. Protection of auditable protected data was attempted. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ...
  25. Protection of auditable protected data. Data Description: %2 Key Identifier: %1 Protected Data Flags: %3 Protection Algorithms: ...
  26. Provide a hint to help you remember your password. Set the hint so that others cannot use it to easily guess your password. ...
  27. Provide new credentials for "%ws" Open the Save/Replace credentials dialog box to replace the existing credentials or delete ...
  28. Provide the location of the UNIX-based NIS map source files. You can either copy the files to a local directory or enter ...
  29. Provide the user name and password to use for scheduling the backup. The user account must have write permission to the remote ...
  30. Provider %1 did not close its registered endpoints during shutdown. There are %2 endpoints still open. Providers are required ...
  31. Provider %1 failed to initialize but still has %2 registered endpoints. Providers are required to close all endpoints and ...
  32. Provider %1 was loaded from %2 and initialized successfully but provider did not register required callback functions. These ...
  33. Provider %1 was loaded from %2 and initialized successfully but the provider did not register the required callback functions. ...
  34. Provider cannot determine the value. Possible reasons: The record was just created, the default value for the field was not ...
  35. Provider cannot keep track of all the changes. Client must refetch the data associated with the watch region by using another ...
  36. Provider returned incorrect type for property, ignoring (custom property may have been registered with different types on ...
  37. provider`p`provider flags level]`A single Event Trace provider to enable. The terms 'Flags' and 'Keywords' are synonymous ...
  38. Provides a common interface and object model to access management information about operating system, devices, applications ...
  39. Provides a mechanism to exchange data between the virtual machine and the operating system running on the physical computer. ...
  40. Provides a mechanism to shut down the operating system of this virtual machine from the management interfaces on the physical ...
  41. Provides a messaging infrastructure and development tool for creating distributed messaging applications for Windows-based ...
  42. Provides a method that initiates a new internal transaction and returns an MSMQ transaction object representing the new underlying ...
  43. Provides a method that initiates a new MS DTC external transaction and returns an MSMQ transaction object representing the ...
  44. Provides a network service that processes requests to simulate application of Group Policy settings for a target user or ...
  45. Provides a space for you to type a server name or a domain name. You can use wildcards in the domain name. Some examples ...
  46. Provides a way to add comments to a script. Syntax: REM Example: In this example script, REM is used to provide a comment ...
  47. Provides administrative services for IIS, for example configuration history and Application Pool account mapping. If this ...
  48. Provides automatic IPv6 connectivity over an IPv4 network. If this service is stopped, the machine will only have IPv6 connectivity ...
  49. Provides content indexing and property caching for file, email and other content (via extensibility APIs). The service responds ...
  50. Provides file system-specific information about an item in the Offline Files cache. This information is available only for ...
  51. Provides for setting a more granular set of auditing permissions to the existing account specified.The permissions are set ...
  52. Provides four management services: Catalog Database Service, which confirms the signatures of Windows files and allows new ...
  53. Provides identity services for the Peer Name Resolution Protocol (PNRP) and Peer-to-Peer Grouping services. If disabled, ...
  54. Provides information protection technology for the enterprise that works with RMS-enabled applications to help safeguard ...
  55. Provides management services for disks, volumes, file systems, and, hardward array objects such as subsystems, luns, controllers, ...
  56. Provides Network Access Protection enforcement for EAP authenticated network connections, such as those used with 802.1X ...
  57. Provides network address translation, addressing, name resolution and/or intrusion prevention services for a home or small ...
  58. Provides no integrity protection for the packet payload or IP header. Use this option only to support network devices and ...
  59. Provides performance library information from Windows Management Instrumentation (WMI) providers to clients on the network. ...
  60. Provides performance library information from Windows Management Instrumentation (WMI) providers to clients on the network. ...
  61. Provides properties that return information about the Message Queuing service on a computer and methods that perform general ...
  62. Provides properties that specify an underlying MS DTC external transaction object or internal transaction object and the ...
  63. Provides protected storage for sensitive data, such as passwords, to prevent access by unauthorized services, processes, ...
  64. Provides registered licenses for Remote Desktop Services clients. If this service is stopped, the server will be unavailable ...
  65. Provides registered licenses for Remote Desktop Services clients. If this service is stopped, the server will be unavailable ...
  66. Provides rule-based monitoring of messages arriving in a Message Queuing queue and, when the conditions of a rule are satisfied, ...
  67. Provides secure remote connectivity to remote computers on your corporate network, from anywhere on the Internet. If this ...
  68. Provides server-level role management and licensing services to help licensees stay within the terms of their licensing agreements. ...
  69. Provides support for collaboration outside the enterprise boundaries that works with ADFS passive protocol federation and ...
  70. Provides support for out-of-process session states for ASP.NET. If this service is stopped, out-of-process requests will ...
  71. Provides support for the NetBIOS over TCP/IP (NetBT) service and NetBIOS name resolution for clients on the network, therefore ...
  72. Provides support for the Secure Socket Tunneling Protocol (SSTP) to connect to remote computers using VPN. If this service ...
  73. Provides technologies that help you manage storage, enable file replication, manage shared folders, ensure fast file searching, ...
  74. Provides Telephony API (TAPI) support for programs that control telephony devices on the local computer and, through the ...
  75. Provides the core file encryption technology used to store encrypted files on NTFS file system volumes. If this service is ...