Windows 7
- Prompts users for alternate logon credentials during network-based installations. This setting displays the "Install Program ...
- Propagation stopped because the propagation state for search server cannot be read. Try propagation again. If this error ...
- Properties for this program cannot be verified. Another program may be using the APPS.INF file. Close your other programs ...
- Properties for this program cannot be verified. The APPS.INF file is missing. Copy the APPS.INF file from your Windows Setup ...
- Properties you entered cannot be saved because the Data Link file is inaccessible. Ensure that the hard drive or network ...
- Property (%1) defined in schema has the Property ID (%2) which collides with property (%3) already defined. Ignoring the ...
- Property (%1) defined in schema is attempting to use Property ID (%2) which was already being used by another property. Update ...
- Property cache modification takes effect when Indexing Service is restarted. Only newly filtered documents will have the ...
- Property Store is not found in the indexer. The possible causes are that the call came during a catalog reset or that the ...
- PropertyName is a string property and is either DeleteTempFolders or UseTempFolders.They are flags that are either set to ...
- PropertyName is an enumeration of the properties: 0 = LPTPortMapping, 1 = COMPortMapping, 2 = AudioMapping, 3 = ClipboardMapping, ...
- PropertyName is an enumeration of the properties: 0 = SessionDirectoryLocation and 1 = SessionDirectoryClusterNamewhich are ...
- PropertyPolicy defines whether or not the non-null, non-key properties of the associated SettingData instance are treated ...
- Protect data from modification and preserve confidentiality on the network with these integrity and encryption algorithms. ...
- Protected content was recently transferred to this computer. Type the password for your user account on the old computer ...
- Protected Extensible Authentication Protocol (PEAP) is the authentication method used with wireless access points and authenticating ...
- Protected Mode Internet Explorer Shim - intercepts and elevates CreateProcess, WinExec, CoCreateInstance, CoGetClassObject. ...
- Protected Mode Internet Explorer Shim - intercepts save-to-file dialogs and prompts the user with an appropriate location. ...
- Protected Mode Internet Explorer Shim - intercepts save-to-file dialogs and prompts the user with the redirected low location. ...
- Protected mode is currently turned off for the %1!s!, %2!s!, %3!s! and %4!s! zones. Click here to open security settings. ...
- Protected mode protects Internet Explorer from exploited vulnerabilities by reducing the locations Internet Explorer can ...
- Protected Storage helps safeguard data you want to keep private. These details show which program is attempting to access ...
- Protecting your system allows you to undo unwanted system changes. Protecting your documents allows you to restore previous ...
- Protection of auditable protected data was attempted. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ...
- Protection of auditable protected data. Data Description: %2 Key Identifier: %1 Protected Data Flags: %3 Protection Algorithms: ...
- Provide a hint to help you remember your password. Set the hint so that others cannot use it to easily guess your password. ...
- Provide new credentials for "%ws" Open the Save/Replace credentials dialog box to replace the existing credentials or delete ...
- Provide the location of the UNIX-based NIS map source files. You can either copy the files to a local directory or enter ...
- Provide the user name and password to use for scheduling the backup. The user account must have write permission to the remote ...
- Provider %1 did not close its registered endpoints during shutdown. There are %2 endpoints still open. Providers are required ...
- Provider %1 failed to initialize but still has %2 registered endpoints. Providers are required to close all endpoints and ...
- Provider %1 was loaded from %2 and initialized successfully but provider did not register required callback functions. These ...
- Provider %1 was loaded from %2 and initialized successfully but the provider did not register the required callback functions. ...
- Provider cannot determine the value. Possible reasons: The record was just created, the default value for the field was not ...
- Provider cannot keep track of all the changes. Client must refetch the data associated with the watch region by using another ...
- Provider returned incorrect type for property, ignoring (custom property may have been registered with different types on ...
- provider`p`provider flags level]`A single Event Trace provider to enable. The terms 'Flags' and 'Keywords' are synonymous ...
- Provides a common interface and object model to access management information about operating system, devices, applications ...
- Provides a mechanism to exchange data between the virtual machine and the operating system running on the physical computer. ...
- Provides a mechanism to shut down the operating system of this virtual machine from the management interfaces on the physical ...
- Provides a messaging infrastructure and development tool for creating distributed messaging applications for Windows-based ...
- Provides a method that initiates a new internal transaction and returns an MSMQ transaction object representing the new underlying ...
- Provides a method that initiates a new MS DTC external transaction and returns an MSMQ transaction object representing the ...
- Provides a network service that processes requests to simulate application of Group Policy settings for a target user or ...
- Provides a space for you to type a server name or a domain name. You can use wildcards in the domain name. Some examples ...
- Provides a way to add comments to a script. Syntax: REM Example: In this example script, REM is used to provide a comment ...
- Provides administrative services for IIS, for example configuration history and Application Pool account mapping. If this ...
- Provides automatic IPv6 connectivity over an IPv4 network. If this service is stopped, the machine will only have IPv6 connectivity ...
- Provides content indexing and property caching for file, email and other content (via extensibility APIs). The service responds ...
- Provides file system-specific information about an item in the Offline Files cache. This information is available only for ...
- Provides for setting a more granular set of auditing permissions to the existing account specified.The permissions are set ...
- Provides four management services: Catalog Database Service, which confirms the signatures of Windows files and allows new ...
- Provides identity services for the Peer Name Resolution Protocol (PNRP) and Peer-to-Peer Grouping services. If disabled, ...
- Provides information protection technology for the enterprise that works with RMS-enabled applications to help safeguard ...
- Provides management services for disks, volumes, file systems, and, hardward array objects such as subsystems, luns, controllers, ...
- Provides Network Access Protection enforcement for EAP authenticated network connections, such as those used with 802.1X ...
- Provides network address translation, addressing, name resolution and/or intrusion prevention services for a home or small ...
- Provides no integrity protection for the packet payload or IP header. Use this option only to support network devices and ...
- Provides performance library information from Windows Management Instrumentation (WMI) providers to clients on the network. ...
- Provides performance library information from Windows Management Instrumentation (WMI) providers to clients on the network. ...
- Provides properties that return information about the Message Queuing service on a computer and methods that perform general ...
- Provides properties that specify an underlying MS DTC external transaction object or internal transaction object and the ...
- Provides protected storage for sensitive data, such as passwords, to prevent access by unauthorized services, processes, ...
- Provides registered licenses for Remote Desktop Services clients. If this service is stopped, the server will be unavailable ...
- Provides registered licenses for Remote Desktop Services clients. If this service is stopped, the server will be unavailable ...
- Provides rule-based monitoring of messages arriving in a Message Queuing queue and, when the conditions of a rule are satisfied, ...
- Provides secure remote connectivity to remote computers on your corporate network, from anywhere on the Internet. If this ...
- Provides server-level role management and licensing services to help licensees stay within the terms of their licensing agreements. ...
- Provides support for collaboration outside the enterprise boundaries that works with ADFS passive protocol federation and ...
- Provides support for out-of-process session states for ASP.NET. If this service is stopped, out-of-process requests will ...
- Provides support for the NetBIOS over TCP/IP (NetBT) service and NetBIOS name resolution for clients on the network, therefore ...
- Provides support for the Secure Socket Tunneling Protocol (SSTP) to connect to remote computers using VPN. If this service ...
- Provides technologies that help you manage storage, enable file replication, manage shared folders, ensure fast file searching, ...
- Provides Telephony API (TAPI) support for programs that control telephony devices on the local computer and, through the ...
- Provides the core file encryption technology used to store encrypted files on NTFS file system volumes. If this service is ...