Windows 7

  1. User count check did not pass because error %1 occurred in function %2.%r%3%rMake sure that the domain that this computer ...
  2. User credentials does not have permission to perform this operation. The account used for this test must have network logon ...
  3. User credentials does not have permission to perform this operation. The account used for this test must have network logon ...
  4. User devices are logical devices that allow a computer system's users to input, view or hear data. The CIM_UserDevice class ...
  5. User initiated logoff: Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 This event is generated ...
  6. User mode health monitoring has detected that the system is not being responsive. The Failover cluster virtual adapter has ...
  7. User mode health monitoring has detected that the system is not being responsive. The Failover cluster virtual adapter has ...
  8. User Name: %1 Domain: % %2 Request Type: %3 Logon Process: %4 Authentication Package: %5 Workstation Name: %6 Caller User ...
  9. User Principal Name (UPN) claim mapping is set to accept all domain suffixes from this account partner. This setting is not ...
  10. User profiles store settings for your desktop and other information related to your user account. You can create a different ...
  11. User Settings are applied to users regardless of which computer they log on to, and affect only the individual users for ...
  12. User Source Io Owner has exceed the Quota Threshold]% quota threshold for quota on Quota Path on server Server]. The quota ...
  13. User Source Io Owner has reached the quota limit for quota on Quota Path on server Server]. The quota limit is Quota Limit ...
  14. User Source Io Owner has reached the quota limit for quota on Quota Path on server Server]. The quota limit is Quota Limit ...
  15. User Time is the percentage of elapsed time that the process threads spent executing code in user mode. Applications, environment ...
  16. User Time is the percentage of elapsed time that this thread has spent executing code in user mode. Applications, environment ...
  17. User Time is the percentage of elapsed time the processor spends in the user mode. User mode is a restricted processing mode ...
  18. User {0} attempted to save {1} to {2} on the {3} server. This file is in the {4} file group, which is not permitted on the ...
  19. User {0} has exceeded the limit for the quota on {1} on server {2}. The quota limit is {3} MB, and {4} MB currently is in ...
  20. User {0} has exceeded the {1}% quota threshold for the quota on {2} on server {3}. The quota limit is {4} MB, and {5} MB ...
  21. User: %1!s! Domain: %2!s! Connected from: %3!s! Duration: %4!d! days %5!d! hours %6!d! mins %7!d! secs Restriction state: ...
  22. UserFileReads : %1 UserFileReadBytes : %2 UserDiskReads : %3 UserFileWrites : %4 UserFileWriteBytes : %5 UserDiskWrites : ...
  23. UserID is the value used by the SecurityService to represent identity. For an authentication service, the UserID may be the ...
  24. UserKeyAndCertFile - Data file containing user private keys and certificates to be archived. This can be any of the following: ...
  25. username% will no longer be able to log on, and all of %username%'s settings will be deleted. However, %username%'s files ...
  26. username, password Credentials for the user identity that should be impersonated when accessing the physical path for the ...
  27. Users browsing to your site or application could see some privileged information that is contained in the detailed error ...
  28. Users can connect to network resources by using RD Gateway. Network resources can include computers in an Active Directory ...
  29. Users can send scanned documents to an e-mail address. They can also receive an e-mail notification if this operation fails. ...
  30. Users connected to a shared folder or file are disconnected when you close the folder or file and may lose data. When possible, ...
  31. Users in the local domain can be authenticated to use all of the resources in the specified domain or only those resources ...
  32. Users in the local forest can be authenticated to use all of the resources in the specified forest or only those resources ...
  33. Users in the specified domain can be authenticated to use all of the resources in the local domain or only those resources ...
  34. Users in the specified forest can be authenticated to use all of the resources in the local forest or only those resources ...
  35. Users may lose data if disconnected without warning. When possible, notify users before disconnecting them. Do you want to ...
  36. Users on computers running NFS client software can access directories (called shares) on computers running Server for NFS ...
  37. Users that are members of the selected group or groups will be allowed or denied access based on the network policy Access ...
  38. user`u`user password]`User to Run As. Entering a for the password produces a prompt for the password. The password is not ...
  39. Uses routing information to determine the cost of a route from a specified site to another specified site or sites. The querysites ...
  40. Using a directory service to check the e-mail addresses of your message recipients may slow down the performance of your ...
  41. Using a PIN to encrypt the preshared key increases the security of your deployment. Users will need the PIN in order to install ...
  42. Using a server-based sign-up method, you can completely control the users sign-up experience via files on the server. The ...
  43. Using an account with a blank password as the AD LDS service account is a security risk. Do you want to continue using this ...
  44. Using automatic certificate requests, an administrator can specify which types of certificate can be automatically requested ...
  45. Using non-genuine %4 software may expose your computer to increased security risks including viruses, worms, and other malicious ...
  46. Using RemoteApp, you can access programs on a remote computer through Remote Desktop Services. Although the programs are ...
  47. Using servers for Internet browsing does not adhere to sound security practices because Internet browsing increases the exposure ...
  48. Using system protection on a drive that contains other shadow copies will cause older system restore points to be deleted ...
  49. Using system protection on a drive that contains system image backups will cause other shadow copies to be deleted faster ...
  50. Using the contrast control on your display, set the contrast as high as possible without losing the ability to see the wrinkles ...
  51. Using the controls on your display, set the brightness higher or lower until you can distinguish the shirt from the suit ...
  52. Using the DFS Management MMC snap-in, change the path of the staging folder for the replicated folder on the member in the ...
  53. Using the DFS Management MMC snap-in, change the path of the staging folder for the SYSVOL folder on this domain controller. ...
  54. Using the DFS Management MMC snap-in, change the staging folder for the replicated folder on the member in the replication ...
  55. Using the DFS Management MMC snap-in, change the staging folder for the replicated folder on this local computer in the replication ...
  56. Using the DFS Management MMC snap-in, delete the replicated folder from the local computer in the replication group . Add ...
  57. Using the DFS Management MMC snap-in, delete the replicated folder from the member in the replication group . Add the replicated ...
  58. Using the DFS Management MMC snap-in, delete the replicated folder from the member in the replication group . Add the replicated ...
  59. Using the Failover cluster Management UI, online the disk hosting the replicated folder from the member in the replication ...
  60. Using the following variables, you can create a format for automatically generating custom computer names for new installations: ...
  61. Using the same share name for both SMB-based and NFS-based access is not recommended because clients that support both protocols ...
  62. Using this wizard, you can create a Connection Manager profile that customizes Connection Manager for users of your service. ...
  63. Using TTL scoping is not recommended. By enabling TTL scoping, you sacrifice bandwidth in your network, since data will be ...
  64. Using Windows Internal Database will limit this AD RMS cluster to a single-server cluster. If you intend to join more servers ...
  65. Using Windows Media Center over a wireless network may result in inconsistent performance. For the highest quality, wire ...
  66. Using Windows System Resource Manager (WSRM) can help ensure equitable servicing of Web server traffic, especially when there ...
  67. Using your current location and calling card selection, dialing this number could result in a emergency services call to ...
  68. Using your keyboard or the numeric keypad on your Windows Media Center remote control, enter a channel number that you know ...
  69. Using your keyboard or the numeric keypad on your Windows Media Center remote control, enter a three-digit channel that you ...
  70. USN Commands Supported - createjournal Create a USN journal deletejournal Delete a USN journal enumdata Enumerate USN data ...
  71. USN Journal Records Accepted shows the number of update sequence number (USN) journal records that were processed by the ...
  72. USN Journal Records Read shows the number of update sequence number (USN) journal records that were read by the DFS Replication ...
  73. USN Journal Unread Percentage shows the percent of the update sequence number (USN) journal that has not yet been read and ...
  74. Usually, any well-known entry identifiers are replaced by their friendly shorthand form. Specifying /v as a command-line ...
  75. V3NT 1.3 upgrade and V3Pro 2000 Deluxe are incompatible with this version of Windows. For V3Pro 2000 Deluxe, you should install ...