Windows 8.1

  1. SHOWISM can very useful for locating improperly configured sites. This operation cannot be executed remotely. As the KCC ...
  2. Shows the attributes applied to the node selected in the tree control. You can edit properties by double-clicking on the ...
  3. Shows the current SSTP Certificate configuration Friendly name - Certificate Friendly name Display name - Display Friendly ...
  4. Shows the idle timeout and network outage time values for IKEv2 client connections. idletimeout - Shows the idle timeout ...
  5. Shows the IKEv2 Security Association's expiration controls. saexpirytime - Shows the SA expiry value in minutes for IKEv2 ...
  6. Shows the mobility support of IKEv2 based remote access clients. ENABLED - Support mobility of remote access clients DISABLED ...
  7. Shuffling refreshes the music on your device by replacing the existing music files with new ones. Do you want to continue? ...
  8. Shut down the system This security setting determines which users who are logged on locally to the computer can shut down ...
  9. Shut down the virtual machine and convert the chain of VHD-format differencing virtual hard disks to the VHDX format or merge ...
  10. Shut down the virtual machine and convert the VHD-format dynamic virtual hard disk to a VHDX-format virtual hard disk or ...
  11. Shut down the virtual machine and use Hyper-V Manager to remove the SCSI controller from the virtual machine. Then, restart ...
  12. Shutdown: Allow system to be shut down without having to log on This security setting determines whether a computer can be ...
  13. Shutdown: Clear virtual memory pagefile This security setting determines whether the virtual memory pagefile is cleared when ...
  14. SID filtering is enabled for this trust. Only SIDs from the trusted domain will be accepted for authorization data returned ...
  15. SID filtering is not enabled for this trust. All SIDs presented in an authentication request from this domain will be honored. ...
  16. SID History was added to an account. Subject: Security ID: %6 Account Name: %7 Account Domain: %8 Logon ID: %9 Target Account: ...
  17. SIDs were filtered. Target Account: Security ID: %1 Account Name: %2 Account Domain: %3 Trust Information: Trust Direction: ...
  18. Sign in with a Microsoft account to easily get your online email, photos, files and settings (like browser history and favorites) ...
  19. Signal strength from "%ws" is low This could be caused by the computer being too far away from the wireless router or access ...
  20. Signals Windows when an application is attempting to listen on an interface and has opted in for edge traversing traffic. ...
  21. Signature (SIG) Cryptographic signature (SIG) record. Authenticates a resource record set of a particular type, class, and ...
  22. Signature validation cannot be performed on modules loaded by COM, so the object will not be created. The object is likely ...
  23. signature version has been updated. Current Signature Version:%b%3 Previous Signature Version:%b%4 Signature Type:%b%12 Update ...
  24. Significant data loss might occur if the virtual machine encounters a problem and a recent backup does not exist. This impacts ...
  25. Signing Certificate is automatically updated by OCSP Responder Service. CA Configuration ID: %1 New Signing Certificate Hash: ...
  26. Signing Certificate was automatically updated by the OCSP Responder Service. CA Configuration ID: %1 New Signing Certificate ...
  27. Similar to the way that logical devices are 'Realized' by physical elements, unitary computer systems are realized in one ...
  28. Simple MAPI support could not be enabled because MAPISTUB.DLL could not be found in the system directory or failed to load. ...
  29. Simple MAPI support could not be enabled because the MAPISTUB.DLL in the system directory is missing a needed export. Backing ...
  30. Simple MAPI support could not be enabled. The MAPI32.DLL in the system directory may be in use at this time. Restarting your ...
  31. Simple MAPI support could not be enabled. The MAPISTUB.DLL in the system directory may be corrupt. Deleting the dll and reinstalling ...
  32. Simple Network Management Protocol (SNMP) includes agents that monitor the activity in network devices and report to the ...
  33. Simple Network Management Protocol (SNMP) Service includes agents that monitor the activity in network devices and report ...
  34. Simple TCP/IP Services supports the following TCP/IP services: Character Generator, Daytime, Discard, Echo and Quote of the ...
  35. Simulating a failure could cause the clustered role to be moved to another node in the cluster, and this could interrupt ...
  36. Since software elements in a ready to run state cannot transition into another state, the value of the phase property is ...
  37. Since the SQL instance name does not already exist in the registry and the WID role service is not installed, the instance ...
  38. Since the virtual machine is replicating to a provider other than Hyper-V, these settings cannot be modified here. To modify ...
  39. Since these permissions propagate to all child objects, making this change will require more storage and time to evaluate. ...
  40. Since you have specified the RPC/HTTP proxy echo only option (-E), the endpoint/interface you have specified will be ignored ...
  41. Since your system administrator requires a log to be maintained of all Remote Assistance sessions, Remote Assistance will ...
  42. Single-root I/O virtualization (SR-IOV) requires specific hardware. It also might require drivers to be installed in the ...
  43. Site %1 has been created. To finish configuration of %1: Ensure that %1 is linked to other sites with site links as appropriate. ...
  44. Site '%2' does not have any Domain Controllers for domain '%3'. Domain Controllers in site '%1' have been automatically selected ...
  45. Site '%2' does not have any Global Catalog servers for forest '%3'. Global Catalog servers in site '%1' have been automatically ...
  46. Site '%2' does not have any LDAP servers for non-domain NC '%3'. LDAP servers in site '%1' have been automatically selected ...
  47. Site '%2' is no longer manually configured in the registry as covered by this Domain Controller for domain '%3'. As a result, ...
  48. Site '%2' is no longer manually configured in the registry as covered by this Global Catalog server for forest '%3'. As a ...
  49. Site '%2' is no longer manually configured in the registry as covered by this LDAP server for non-domain NC '%3'. As a result, ...
  50. Site Server 3.0 has a known compatibility issue with this version of Windows. For an update that is compatible with this ...
  51. Size in bytes of the blocks which form this StorageExtent. If variable block size, then the maximum block size in bytes should ...
  52. Size of Files Received shows the uncompressed size (in bytes) of the files received for this replicated folder. This is the ...
  53. Size of Files Received shows the uncompressed size (in bytes) of the files received on this connection. This is the number ...
  54. Skip computer '{0}' with new name '{1}' because the new name is not valid. The new computer name entered is not properly ...
  55. Skip instructions Printing or saving the instructions is strongly recommended. However, if you can't print or save now, you ...
  56. Skipped %1 Extension based on Group Policy client-side processing rules. Refer to a Resultant Set of Policy report for more ...
  57. Skipped posting of %1 repair events. Repair event posting will now be resumed. Here are the skipped posting repair events ...
  58. Skipping creation of restore point (Process = %1; Description = %2) as there is a restore point avaliable which is recent ...
  59. Skipping ping from network interface {2} IP Address {3} to network interface {0} IP Address {1} because the ICMP packet will ...
  60. Sleep requires all device drivers to be compatible with Plug-and-Play and Power Management. If a legacy driver is installed, ...
  61. Sleep states allow the computer to enter low-power modes after a period of inactivity. The S3 sleep state is the default ...
  62. SlotLayout is a free-form string that describes the slot positioning, typical usage, restrictions, individual slot spacings ...
  63. Slots are special types of connectors into which adapter cards are inserted. This relationship of a card in a slot is made ...
  64. Slots are special types of connectors into which adapter cards are typically inserted. The CIM_SlotInSlot relationship represents ...
  65. Slots can be located in close proximity on hostingboards or other cards, such that if one of these slots is populated by ...
  66. Smart card or certificate sign-in failed. Please contact your administrator and tell them that the KDC certificate couldn't ...
  67. Smart Card or other certificate (EAP-TLS). This authentication type requires certificates on smart cards or in the client ...
  68. Smart Card Reader '%2' has not responded to IOCTL %3 in %1 seconds. If this error persists, your smart card or reader may ...
  69. Smart Card Reader '%2' rejected IOCTL %3: %1 If this error persists, your smart card or reader may not be functioning correctly. ...
  70. Smart Card Resource Manager was unable to cancel IOCTL %3 for reader '%2': %1 The reader may no longer be responding. If ...
  71. SmartScreen Filter doesn't recognize this program. Running this program might harm your computer. Name: %1 Publisher: %2 ...
  72. SmartScreen Filter doesn't recognize this unsigned program. Running this program might harm your computer. Name: %1 Publisher: ...
  73. SmartScreen Filter has little or no information about this program. Running this program might harm your computer. Name: ...
  74. SmartScreen Filter has little or no information about this program. Running this program might harm your computer. Name: ...
  75. SmartScreen Filter has little or no information about this unsigned program. Running this program might harm your computer. ...