Windows 8.1
- Number of days after which an event can be overwritten. Values are: 0 = Any entry can be overwritten when necessary.1.365 ...
- Number of distinct event providers that are enabled to ETW sessions; multiple instances of a provider are counted only once. ...
- Number of downstream Ports on the Hub, including those embedded in the Hub's silicon. Individual USBPorts are associated ...
- Number of hard resets issued by the controller. A hard reset returns the device to its initialization or 'boot-up' state. ...
- Number of kilobytes of virtual memory currently unused and available. For example, this may be calculated by adding the amount ...
- Number of kilobytes of virtual memory. For example, this may be calculated by adding the amount of total RAM to the amount ...
- Number of non-read/non-write I/O operations (for instance, control functions) generated by the process since it was started ...
- Number of object property values containing Distinguished Names sent to outbound replication partners. DN-values, such as ...
- Number of object property values received from inbound replication partners that are Distinguished Names; i.e., that reference ...
- Number of objects looked at by outbound replication that were determined to have no updates that the outbound partner did ...
- Number of read I/Os that are received by ReadyBoost. This counter includes all reads whether or not they were satisfied by ...
- Number of scopes being added to the failover relationship exceeds the max number of scopes which can be added to a failover ...
- Number of SCSI retries that have occurred since last hard or soft reset related to the controlled Device. The time of last ...
- Number of SCSI timeouts that have occurred since last hard or soft reset related to the controlled Device. The time of last ...
- Number of search suboperations per second. One search operation is made up of many sub operations. A sub operation roughly ...
- Number of Security Descriptor Propagation suboperations per second. One Security Descriptor Propagation operation is made ...
- Number of soft resets issued by the controller. A soft reset does not completely clear current device state and/or data. ...
- Number of successfully established RDMA connections on which an error occurred before being disconnected by local or remote ...
- Number of system state backups found: %1!lu! Number of copies to keep: %2!lu! Because the number of backups found is less ...
- Number of times per second where graphics data is ready, but Capture is waiting for the client to consume the previous data. ...
- Number of transport security binding %1 is invalid. One and only one transport security binding must be specified in security ...
- Number of unique tracing providers that are registered with the tracing subsystem but are not actively enabled to any trace ...
- Number of virtual processors specified: {0}, maximum number of virtual processors on the system: {1}. Refer to product Help ...
- o fileaccess=mode To specify the permission mode of the file. These are used for new files created on NFS servers. Specified ...
- o lang=euc-jp|euc-tw|euc-kr|shift-jis|big5|ksc5601|gb2312-80|ansi To specify the encoding used for file and directory names. ...
- o rsize=size To set the size of the read buffer in kilobytes. -o wsize=size To set the size of the write buffer in kilobytes. ...
- Object "%1" cannot be deleted because an open window is displaying its properties. To delete this object, close that window ...
- Object "{0}" is the wrong type to return from the dynamicparam block. The dynamicparam block must return either $null, or ...
- Object %1 is a Trusted domain object. To remove trusts use the Active Directory Domains and Trusts snapin. Do you want to ...
- Object Access Attempt: Object Server: %1 Handle ID: %2 Object Type: %3 Process ID: %4 Image File Name: %5 Accesses: %6 Access ...
- Object being moved across-domains is already known to be deleted by the destination server. The source server does not have ...
- Object being synchronized is not present on source directory server : '{0}'. Object to replicate must either exist on the ...
- Object consisting of following fields is returned: BytesTransmitted BytesReceived FramesTransmitted FramesReceived CrcErrors ...
- Object consisting of following fields is returned: BytesTransmitted BytesReceived FramesTransmitted FramesReceived CrcErrors ...
- Object consists of the following objects: Name : String StatsCollectionStartTime : DateTime ZoneQueryStatistics : DnsServerZoneQueryStatistics ...
- Object consists of the following properties 1. Status of DirectAccess - installed or uninstalled 2. Status of VPN - installed ...
- Object consists of the following properties 1. Status of DirectAccess - installed or uninstalled 2. Status of VPN - installed ...
- Object consists of the following properties 1. Status of DirectAccess - installed or uninstalled 2. Status of VPN - installed ...
- Object consists of the following properties 1. Status of DirectAccess and VPN configuration 2. The entire VPN configuration ...
- Object containing the following fields is returned:NameDestinationAdminStatusConnectionStateIPv4SubnetIPv6SubnetProtocol ...
- Object containing the following fields: UserAuthProtocolAccepted TunnelAuthProtocolsAdvertised RootCertificateNameToAccept ...
- Object containing the following fields: UserAuthProtocolAccepted TunnelAuthProtocolsAdvertised RootCertificateNameToAccept ...
- Object contains following fields: DistinguishedName ZoneName ZoneType DynamicUpdate ReplicationScope DirectoryPartitionName ...
- Object contains following fields: DistinguishedName ZoneName ZoneType DynamicUpdate ReplicationScope DirectoryPartitionName ...
- Object contains the following fields: DistinguishedName ZoneName ZoneType DynamicUpdate ReplicationScope DirectoryPartitionName ...
- Object Open for Delete: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: {%5,%6} Process ID: ...
- Object Open: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: %5 Process ID: %6 Image File Name: ...
- Object Open: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: {%5,%6} Process ID: %7 Process ...
- Object Operation: Object Server: %1 Operation Type: %2 Object Type: %3 Object Name: %4 Handle ID: %5 Primary User Name: %6 ...
- Object's implementation of IInspectable::GetTrustLevel returned a value that is different from the trust level configured ...
- ObjectId - ObjectId to display or to add display name GroupId - decimal GroupId number for ObjectIds to enumerate AlgId - ...
- ObjectId cannot be less than or equal to 0. This can happen if the fragments are not properly constructed by the remote computer, ...
- OBJECTID Commands Supported - create Create the object identifier delete Delete the object identifier query Query the object ...
- Objects consisting of the following properties for cluster, server and components of server 1. Component name 2. Remote Access ...
- Obscured or implied sexual acts and visible sexual touching in an artistic, medical, educational, sports or news context. ...
- Obscured or implied sexual acts, visible sexual touching, and passionate kissing in any context. Explicit sexual context ...
- Obtain an updated certificate from your network administrator The certificate required to connect to this network can't be ...
- OCSP Responder Services did not process an extremely long request from %1. This may indicate a denial-of-service attack. ...
- OCSP Revocation Provider successfully updated the revocation information. CA Configuration ID: %1 Base CRL Number: %2 Base ...
- Of %1 files within %2 directories %3 are compressed and %4 are not compressed. %5 total bytes of data are stored in %6 bytes. ...
- of %3 instances of system store corruption have been repaired. Unrepaired corruptions may lead to failures in future system ...
- of the updates you have selected are already approved. If the updates you have selected have an existing approval for a group, ...
- Offers the latest critical and security updates, device drivers, and other features that are available for your Windows computer. ...
- Office 365 Integration will provide additional functions to manage your email addresses, mobile devices and SharePoint libraries. ...
- OfficeScan Corporate Edition is incompatible with this version of Windows. For more information, contact Trend Micro, INC. ...
- Offline Files allows you to access network files while working offline. To set up Offline Files open a network folder, right ...
- Offline Files configuration is being controlled by WMI configuration classes Win32_OfflineFilesUserConfiguration and Win ...
- Offline files on this computer will not be available until the computer is connected to the server after the upgrade. Offline ...
- Offline items were not updated because a connection to the Internet could not be made because File Sharing for Microsoft ...
- Offline pages are webpages that are stored on your computer so you can view them without being connected to the Internet. ...
- Offloaded Bytes Received per Second is the rate of bytes received using IPsec hardware offload. Certain network adapters ...
- Offloaded Bytes Sent per Second is the rate of bytes sent using IPsec hardware offload. Certain network adapters can accelerate ...
- Offloaded Connections is the number of TCP connections (over both IPv4 and IPv6) that are currently handled by the TCP chimney ...
- Offloaded Security Associations is the number of active quick mode security associations offloaded to hardware. Certain network ...
- Offset and length were out of bounds for the array or count is greater than the number of elements from index to the end ...