Windows 8.1

  1. Recovery of individual files, folders, application data, or system state data from DVD or removable media is not supported. ...
  2. Recovery of the application to the original location is not allowed because the application is not registered with Windows ...
  3. Recreating the Windows Media Player media library might allow you to see your music and videos. You might need to recreate ...
  4. Recursion: - Query: Queries Recursed = %1!10lu! Original Questions = %2!10lu! Additional Question = %3!10lu! Total Questions ...
  5. Redeploying this application will reinstall the application everywhere it is already installed. Do you want to continue? ...
  6. Redirect files from one directory to another. This shim accepts a list of directories to redirect, a list of directories ...
  7. Redirect messages are sent to indicate that the node which the packet was sent to is no longer the best gateway to reach ...
  8. Redirect registry keys from one branch to another. This shim accepts a list of branches to redirect, a list of branches to ...
  9. Redirected access is not the normal access mode for Cluster Shared Volumes and should only be used for certain maintenance ...
  10. Redirecting the Music or Videos folders outside the Documents folder is not compatible with Windows 2000, Windows 2000 Server, ...
  11. Redirection only allows another stream to be merged with the output stream. Please correct the redirection operation to merge ...
  12. Redirection Options is configured by adding the following flags None(0), Drives(1), Printers(2), Clipboard(4), Plug and Play(8), ...
  13. Redirection surface can not be created. The size of the surface is larger than what is supported on this machine} Redirection ...
  14. Reduce interference by moving your computer Possible sources of interference include microwave ovens, cordless phones, and ...
  15. Reduces the size of the volume with focus by the specified amount. Makes free disk space available from unused space at the ...
  16. RedundancyStatus provides information on the state of the redundancy group. \"Fully Redundant\" (value=2) means that all ...
  17. Redundant Read} To satisfy a read request, the NT fault-tolerant file system successfully read the requested data from a ...
  18. Redundant Write} To satisfy a write request, the NT fault-tolerant file system successfully wrote a redundant copy of the ...
  19. Reference scope constraint '{0}' has been violated: the uri attribute value '{1}' in element '{2}' is not in the range of ...
  20. Reference to the job spawned if the operation continues after the method returns. (May be null if the task is completed). ...
  21. Reflections with suspiciously long delay. If the room is very large, this is normal. Otherwise, calibration results may be ...
  22. Refresh rate in hertz. If a range of rates is supported, use the MinRefreshRate and MaxRefreshRate properties, and set RefreshRate ...
  23. Refresh the MU URL for all updates will help users in two scenarios: 1. WSUS will obtain new dual-stack URLs for old updates ...
  24. Refreshes the state of all disks in the selected pack, attempts recovery on disks in the invalid pack, and, resynchronizes ...
  25. Refreshes the state of all disks in the selected pack. Attempts recovery on disks in the invalid pack, and resynchronizes ...
  26. Refreshing connection details automatically on a frequent basis can impact server performance. To maximize server performance, ...
  27. REG ADD KeyName /v ValueName | /ve /t Type /s Separator /d Data /f /reg:32 | /reg:64 KeyName \Machine\]FullKey Machine Name ...
  28. REG COMPARE KeyName1 KeyName2 /v ValueName | /ve Output /s /reg:32 | /reg:64 KeyName \Machine\]FullKey Machine Name of remote ...
  29. REG COPY KeyName1 KeyName2 /s /f /reg:32 | /reg:64 KeyName \Machine\]FullKey Machine Name of remote machine - omitting defaults ...
  30. REG DELETE KeyName /v ValueName | /ve | /va /f /reg:32 | /reg:64 KeyName \Machine\]FullKey Machine Name of remote machine ...
  31. REG EXPORT KeyName FileName /y /reg:32 | /reg:64 Keyname ROOTKEY[\SubKey (local machine only). ROOTKEY HKLM | HKCU | HKCR ...
  32. REG FLAGS KeyName QUERY | SET DONT_VIRTUALIZE DONT_SILENT_FAIL RECURSE_FLAG /reg:32 | /reg:64 Keyname "HKLM\Software"[\SubKey ...
  33. REG IMPORT FileName /reg:32 | /reg:64 FileName The name of the disk file to import (local machine only). /reg:32 Specifies ...
  34. REG LOAD KeyName FileName /reg:32 | /reg:64 KeyName ROOTKEY\SubKey (local machine only) ROOTKEY HKLM | HKU SubKey The key ...
  35. REG Operation Parameter List Operation QUERY | ADD | DELETE | COPY | SAVE | LOAD | UNLOAD | RESTORE | COMPARE | EXPORT | ...
  36. REG QUERY KeyName /v ValueName | /ve /s /f Data /k /d /c /e /t Type /z /se Separator /reg:32 | /reg:64 KeyName \Machine\]FullKey ...
  37. REG RESTORE KeyName FileName /reg:32 | /reg:64 KeyName ROOTKEY\SubKey (local machine only) ROOTKEY HKLM | HKCU | HKCR | HKU ...
  38. REG SAVE KeyName FileName /y /reg:32 | /reg:64 KeyName ROOTKEY\SubKey ROOTKEY HKLM | HKCU | HKCR | HKU | HKCC SubKey The ...
  39. REG UNLOAD KeyName KeyName ROOTKEY\SubKey (local machine only) ROOTKEY HKLM | HKU SubKey The key name of the hive to unload. ...
  40. Register application as a protocol handler. The command line takes a series of 3 values, multiple Clients may be separated ...
  41. Register the SPN to the appropriate account using Setspn.exe. Test the application to ensure that delegation works correctly. ...
  42. Register-PSSessionConfiguration : The '{0}' key in the {1}. session configuration file contains a value that is not valid. ...
  43. Registered type library information is invalid. The library GUID, version, locale, or platform information may be corrupt. ...
  44. Registered: Identifying Number = %1, Product Name = %2, UUID = %3, Vendor = %4, Version = %5, Computer Name = %6, System ...
  45. Registers and updates IP addresses and DNS records for this computer. If this service is stopped, this computer will not ...
  46. Registration of the DNS records for resource {0} has been initiated. Any errors will be reported in the resource's StatusDNS ...
  47. Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported ...
  48. Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported ...
  49. Registration of this component failed. This component resides in a file which lacks self-registration code but for which ...
  50. Registry Editor could not retrieve the security information. The key currently selected does not give you access to retrieve ...
  51. Registry Editor could not save the security information. The key currently selected does not give you access to save such ...
  52. Registry Editor could not set security in all subkeys. The key currently selected contains one or more inaccessible subkeys. ...
  53. Registry Editor could not set security in all subkeys. The key currently selected contains one or more subkeys marked for ...
  54. Registry Editor could not set security in the key currently selected, or some of its subkeys. These keys do not give you ...
  55. Registry File Failure} The registry cannot load the hive (file): %hs or its log or alternate. It is corrupt, absent, or not ...
  56. Registry Hive Recovered} Registry hive (file): %hs was corrupted and it has been recovered. Some data might have been lost. ...
  57. Registry Hive Recovered} Registry hive (file): '%3' was corrupted and it has been recovered. Some data might have been lost. ...
  58. Registry key is under the HKEY_CURRENT_USER hive, Theoretically, if this is false, the class instance should be stored in ...
  59. Registry policy allows an administrator to configure registry settings of any type. This policy differs significantly from ...
  60. Registry Quota In Use is the percentage of the Total Registry Quota Allowed that is currently being used by the system. This ...
  61. Registry Recovery} One of the files containing the system's Registry data had to be recovered by use of a log or alternate ...
  62. Registry security settings Allows an administrator to define access permissions (on discretionary access control lists (DACLs)) ...
  63. Registry This policy setting allows you to audit attempts to access registry objects. A security audit event is generated ...
  64. RegNotifyChangeKeyValue failed with a return code of %1. Initialization will continue, but registry changes will not be updated ...
  65. Regularly run data deduplication at low priority and pause data deduplication when the system is busy to minimize the impact ...
  66. Rehosts all the read-only partitions on a Global Catalog. This command disables connection translation, enables strict replication ...
  67. Reinstalls agreement TS Licensing key packAgreementType is an enumeration of the following values:SELECT=0, ENTERPRISE=1, ...
  68. Reinstalls open TS Licensing key packProductVersion is an enumeration of the following values:Windows 2000 Server=0,Windows ...
  69. Reject (This client is on the affinity list of another cluster node although this node owns handling traffic from the client) ...
  70. Reject (This cluster node does not own handling traffic from this client and this client is not on the affinity list of this ...
  71. Reject (While the extended affinity list is in the current transition state, connections from this client will not be handled) ...
  72. Rejecting a request to register from %1 because the files are on a network share. Copy the files to the local computer before ...
  73. Relay Packets Received : %1!u! Success : %2!u! (Bubble %3!u!, Data %4!u!) Failure : %5!u! (Hdr %6!u!, Src %7!u!, Dest %8!u!) ...
  74. Reliability index values for %s: Beginning value - %02.02f; Ending value - %02.02f; Minimum value: %02.02f; Maximum value: ...
  75. Reliability Monitor does not have up to date data for this computer because RACTask might be disabled or configured for optimal ...