Windows 8.1

  1. Number of days after which an event can be overwritten. Values are: 0 = Any entry can be overwritten when necessary.1.365 ...
  2. Number of distinct event providers that are enabled to ETW sessions; multiple instances of a provider are counted only once. ...
  3. Number of downstream Ports on the Hub, including those embedded in the Hub's silicon. Individual USBPorts are associated ...
  4. Number of hard resets issued by the controller. A hard reset returns the device to its initialization or 'boot-up' state. ...
  5. Number of kilobytes of virtual memory currently unused and available. For example, this may be calculated by adding the amount ...
  6. Number of kilobytes of virtual memory. For example, this may be calculated by adding the amount of total RAM to the amount ...
  7. Number of non-read/non-write I/O operations (for instance, control functions) generated by the process since it was started ...
  8. Number of object property values containing Distinguished Names sent to outbound replication partners. DN-values, such as ...
  9. Number of object property values received from inbound replication partners that are Distinguished Names; i.e., that reference ...
  10. Number of objects looked at by outbound replication that were determined to have no updates that the outbound partner did ...
  11. Number of read I/Os that are received by ReadyBoost. This counter includes all reads whether or not they were satisfied by ...
  12. Number of scopes being added to the failover relationship exceeds the max number of scopes which can be added to a failover ...
  13. Number of SCSI retries that have occurred since last hard or soft reset related to the controlled Device. The time of last ...
  14. Number of SCSI timeouts that have occurred since last hard or soft reset related to the controlled Device. The time of last ...
  15. Number of search suboperations per second. One search operation is made up of many sub operations. A sub operation roughly ...
  16. Number of Security Descriptor Propagation suboperations per second. One Security Descriptor Propagation operation is made ...
  17. Number of soft resets issued by the controller. A soft reset does not completely clear current device state and/or data. ...
  18. Number of successfully established RDMA connections on which an error occurred before being disconnected by local or remote ...
  19. Number of system state backups found: %1!lu! Number of copies to keep: %2!lu! Because the number of backups found is less ...
  20. Number of times per second where graphics data is ready, but Capture is waiting for the client to consume the previous data. ...
  21. Number of transport security binding %1 is invalid. One and only one transport security binding must be specified in security ...
  22. Number of unique tracing providers that are registered with the tracing subsystem but are not actively enabled to any trace ...
  23. Number of virtual processors specified: {0}, maximum number of virtual processors on the system: {1}. Refer to product Help ...
  24. o fileaccess=mode To specify the permission mode of the file. These are used for new files created on NFS servers. Specified ...
  25. o lang=euc-jp|euc-tw|euc-kr|shift-jis|big5|ksc5601|gb2312-80|ansi To specify the encoding used for file and directory names. ...
  26. o rsize=size To set the size of the read buffer in kilobytes. -o wsize=size To set the size of the write buffer in kilobytes. ...
  27. Object "%1" cannot be deleted because an open window is displaying its properties. To delete this object, close that window ...
  28. Object "{0}" is the wrong type to return from the dynamicparam block. The dynamicparam block must return either $null, or ...
  29. Object %1 is a Trusted domain object. To remove trusts use the Active Directory Domains and Trusts snapin. Do you want to ...
  30. Object Access Attempt: Object Server: %1 Handle ID: %2 Object Type: %3 Process ID: %4 Image File Name: %5 Accesses: %6 Access ...
  31. Object being moved across-domains is already known to be deleted by the destination server. The source server does not have ...
  32. Object being synchronized is not present on source directory server : '{0}'. Object to replicate must either exist on the ...
  33. Object consisting of following fields is returned: BytesTransmitted BytesReceived FramesTransmitted FramesReceived CrcErrors ...
  34. Object consisting of following fields is returned: BytesTransmitted BytesReceived FramesTransmitted FramesReceived CrcErrors ...
  35. Object consists of the following objects: Name : String StatsCollectionStartTime : DateTime ZoneQueryStatistics : DnsServerZoneQueryStatistics ...
  36. Object consists of the following properties 1. Status of DirectAccess - installed or uninstalled 2. Status of VPN - installed ...
  37. Object consists of the following properties 1. Status of DirectAccess - installed or uninstalled 2. Status of VPN - installed ...
  38. Object consists of the following properties 1. Status of DirectAccess - installed or uninstalled 2. Status of VPN - installed ...
  39. Object consists of the following properties 1. Status of DirectAccess and VPN configuration 2. The entire VPN configuration ...
  40. Object containing the following fields is returned:NameDestinationAdminStatusConnectionStateIPv4SubnetIPv6SubnetProtocol ...
  41. Object containing the following fields: UserAuthProtocolAccepted TunnelAuthProtocolsAdvertised RootCertificateNameToAccept ...
  42. Object containing the following fields: UserAuthProtocolAccepted TunnelAuthProtocolsAdvertised RootCertificateNameToAccept ...
  43. Object contains following fields: DistinguishedName ZoneName ZoneType DynamicUpdate ReplicationScope DirectoryPartitionName ...
  44. Object contains following fields: DistinguishedName ZoneName ZoneType DynamicUpdate ReplicationScope DirectoryPartitionName ...
  45. Object contains the following fields: DistinguishedName ZoneName ZoneType DynamicUpdate ReplicationScope DirectoryPartitionName ...
  46. Object Open for Delete: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: {%5,%6} Process ID: ...
  47. Object Open: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: %5 Process ID: %6 Image File Name: ...
  48. Object Open: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: {%5,%6} Process ID: %7 Process ...
  49. Object Operation: Object Server: %1 Operation Type: %2 Object Type: %3 Object Name: %4 Handle ID: %5 Primary User Name: %6 ...
  50. Object's implementation of IInspectable::GetTrustLevel returned a value that is different from the trust level configured ...
  51. ObjectId - ObjectId to display or to add display name GroupId - decimal GroupId number for ObjectIds to enumerate AlgId - ...
  52. ObjectId cannot be less than or equal to 0. This can happen if the fragments are not properly constructed by the remote computer, ...
  53. OBJECTID Commands Supported - create Create the object identifier delete Delete the object identifier query Query the object ...
  54. Objects consisting of the following properties for cluster, server and components of server 1. Component name 2. Remote Access ...
  55. Obscured or implied sexual acts and visible sexual touching in an artistic, medical, educational, sports or news context. ...
  56. Obscured or implied sexual acts, visible sexual touching, and passionate kissing in any context. Explicit sexual context ...
  57. Obtain an updated certificate from your network administrator The certificate required to connect to this network can't be ...
  58. OCSP Responder Services did not process an extremely long request from %1. This may indicate a denial-of-service attack. ...
  59. OCSP Revocation Provider successfully updated the revocation information. CA Configuration ID: %1 Base CRL Number: %2 Base ...
  60. Of %1 files within %2 directories %3 are compressed and %4 are not compressed. %5 total bytes of data are stored in %6 bytes. ...
  61. of %3 instances of system store corruption have been repaired. Unrepaired corruptions may lead to failures in future system ...
  62. of the updates you have selected are already approved. If the updates you have selected have an existing approval for a group, ...
  63. Offers the latest critical and security updates, device drivers, and other features that are available for your Windows computer. ...
  64. Office 365 Integration will provide additional functions to manage your email addresses, mobile devices and SharePoint libraries. ...
  65. OfficeScan Corporate Edition is incompatible with this version of Windows. For more information, contact Trend Micro, INC. ...
  66. Offline Files allows you to access network files while working offline. To set up Offline Files open a network folder, right ...
  67. Offline Files configuration is being controlled by WMI configuration classes Win32_OfflineFilesUserConfiguration and Win ...
  68. Offline files on this computer will not be available until the computer is connected to the server after the upgrade. Offline ...
  69. Offline items were not updated because a connection to the Internet could not be made because File Sharing for Microsoft ...
  70. Offline pages are webpages that are stored on your computer so you can view them without being connected to the Internet. ...
  71. Offloaded Bytes Received per Second is the rate of bytes received using IPsec hardware offload. Certain network adapters ...
  72. Offloaded Bytes Sent per Second is the rate of bytes sent using IPsec hardware offload. Certain network adapters can accelerate ...
  73. Offloaded Connections is the number of TCP connections (over both IPv4 and IPv6) that are currently handled by the TCP chimney ...
  74. Offloaded Security Associations is the number of active quick mode security associations offloaded to hardware. Certain network ...
  75. Offset and length were out of bounds for the array or count is greater than the number of elements from index to the end ...