Windows 8.1

  1. A file that is required cannot be installed because the cabinet file 2 is not digitally signed. This may indicate that the ...
  2. A file was found to have a security ID that is not described in the security file. The invalid security ID is 1!lx!. The ...
  3. A file was virtualized. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: File Name: %5 Virtual ...
  4. A file with the same name as the destination path already exists on the destination server. Specify a different destination ...
  5. A filter action requires at least one security method for negotiation. This filter action has none. Select a different one, ...
  6. A filter action sets the security requirements for a data transfer. These requirements are specified in a list of security ...
  7. A filter, such as 'name -like "*"', which is used to search the directory for matching fine grained password policy objects. ...
  8. A filter, such as 'samAccountName -like "*service*"', which is used to search the directory for matching service accounts. ...
  9. A firewall can help prevent hackers or malicious software from gaining access to your PC through a network or the Internet. ...
  10. A firewall is blocking inbound traffic on TCP port 443, which is used by the Hosted Cache server for accepting incoming client ...
  11. A firewall is blocking inbound traffic on TCP port 80, which is used to serve content to requesting computers. As a result, ...
  12. A firewall is blocking inbound traffic on UDP port 3702, which is used to discover the availability of cached content on ...
  13. A firewall or network configuration issue is preventing media playback. Search Windows Help for information about setting ...
  14. A firewall product is not enabled on this system. It is highly recommended you run Windows with one enabled firewall product. ...
  15. A folder that is shared by using both the Server Message Block (SMB) protocol and the Network File System (NFS) protocol ...
  16. A folder with this name already exists. To add another target, right-click the folder, and then click Add Folder Target. ...
  17. A font file could not be opened because the file, directory, network location, drive, or other storage location does not ...
  18. A forward lookup zone translates DNS names to IP addresses and network services. This is an essential function for most DNS ...
  19. A free form string indicating the algorithm or tool used by the device to support compression. If it is not possible or not ...
  20. A free form string indicating the algorithm or tool used to compress the file system. If it is not possible or not desired ...
  21. A free form string indicating the algorithm or tool used to encrypt the file system. If it is not possible or not desired ...
  22. A free-form string containing a human-readable description of CIMStatusCode. This description MAY extend, but MUST be consistent ...
  23. A free-form string describing that this slot is physically unique and may hold special types of hardware. This property only ...
  24. A free-form string describing the way(s) in which this card is physically unique from other cards. This property only has ...
  25. A free-form string providing a description of the organization when 1, \"Other\", is specified for the RegisteredOrganization. ...
  26. A free-form string providing additional information related to the AdvertiseType. A description MUST be provided when the ...
  27. A free-form string providing additional information related to the AdvertiseTypes. A description shall be provided for each ...
  28. A free-form string representing the positioning of the PhysicalElement within the PhysicalPackage. Information relative to ...
  29. A free-form string specifying information related to the CIM_ReplacementSet. The purpose of the set or information related ...
  30. A free-form string that contains the vendor error description. Note that this property is also present in the JobProcessingStatistics ...
  31. A free-form string that represents the status of the job. The primary status is reflected in the inherited OperationalStatus ...
  32. A fully qualified domain name (FQDN) consists of a host and domain name, including top-level domain. For example, www.contonso.com ...
  33. A Generation ID change has been detected. Generation ID cached in DS (old value): %1 Generation ID currently in VM (new value): ...
  34. A Generation ID change has been detected. Generation ID cached in DS (old value): %1 Generation ID currently in VM (new value): ...
  35. A global catalog (GC) cannot be contacted. A GC is needed to list the object's group memberships. The GC may be temporarily ...
  36. A global catalog (GC) cannot be contacted. A GC is needed to list the object's group memberships. The GC may be temporarily ...
  37. A global catalog cannot be contacted to retrieve the icons for the member list because access was denied. Some icons may ...
  38. A global load balancing FQDN is configured, but the global load balancing IP address cannot be identified automatically. ...
  39. A group of instances that share the same configuration and schema is called a configuration set. Setup will replicate configuration ...
  40. A group policy corresponding to the new incoming port will be created. Organization Units configured to use the previous ...
  41. A group policy file in SYSVOL is locked. This may prevent synchronizing important Group Policy files between domain controllers. ...
  42. A group policy file in SYSVOL is locked. This may prevent synchronizing important Group Policy files between domain controllers. ...
  43. A Group Policy Object(GPO) name was not specified. In order to configure NRPT settings in the GPO, you must specify a valid ...
  44. A group's type was changed. Subject: Security ID: %5 Account Name: %6 Account Domain: %7 Logon ID: %8 Change Type: %1 Group: ...
  45. A Guard Page was modified by a collect procedure in Extensible Counter DLL "%1!s!" for the "%2!s!" service. The performance ...
  46. A guest operating system that supports a network adapter is configured with a legacy network adapter. This configuration ...
  47. A guid corresponding to the ApplicationId property of RSOP_ApplicationManagmentPolicySetting for the application that caused ...
  48. A GUID used to correlate reliability metrics on this computer. The GUID will be reset if an error prevents reliability metrics ...
  49. A GUID used to identify the Issuance License (IL) to the customer. The ILID is not unique, unless combined with the ILVID. ...
  50. A handle to an object has been duplicated: Source Handle ID: %1 Source Process ID: %2 Target Handle ID: %3 Target Process ...
  51. A handle to an object was requested with intent to delete. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ...
  52. A handle to an object was requested. Subject : Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: Object ...
  53. A handle to an object was requested. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: Object ...
  54. A handle to an object was requested. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: Object ...
  55. A hard drive can only be added to a Storage Spaces drive. You cannot increase the capacity of this drive by adding other ...
  56. A hardware error has occurred, which caused the operation to time out. Check the status of the hardware, and then try the ...
  57. A hardware error occurred while formatting this disc. You can try again with a different disc, but if this problem persists, ...
  58. A hardware event has occurred. An informational record describing the condition is contained in the data section of this ...
  59. A homegroup can only be created on a private network. To change your network location setting, open Network and Sharing Center ...
  60. A homegroup links computers on your home network so that you can share pictures, music, videos, documents, and printers. ...
  61. A Hyper-V Replica Broker is required on this cluster for allowing replication from the current Replica Server after planned ...
  62. A Hyper-V Replica Broker is required on this cluster for allowing replication from the current Replica Server after planned ...
  63. A Hyper-V Replica Broker needs to be created on the failover cluster "{0}". Create the Hyper-V Replica Broker using Failover ...
  64. A Hyper-V Replica Broker needs to be created on this failover cluster. Create the Hyper-V Replica Broker using Failover Cluster ...
  65. A job could not be created from the {0} specification because the provided runspace is not a local runspace. Try again using ...
  66. A Job is a LogicalElement that represents an executing unit of work, such as a script or a print job. A Job is distinct from ...
  67. A Kerberos authentication ticket (TGT) was requested. Account Information: Account Name: %1 Supplied Realm Name: %2 User ...
  68. A Kerberos authentication ticket request failed. Account Information: Account Name: %1 Supplied Realm Name: %2 Service Information: ...
  69. A Kerberos error message was received: on logon session %1 Client Time: %2 Server Time: %3 Error Code: %4 %5 Extended Error: ...
  70. A Kerberos service ticket request failed. Account Information: Account Name: %1 Account Domain: %2 Service Information: Service ...
  71. A Kerberos service ticket was denied because the user, device, or both does not meet the access control restrictions. Account ...
  72. A Kerberos service ticket was denied because the user, device, or both does not meet the access control restrictions. Account ...
  73. A Kerberos service ticket was issued for a member of the Protected User group. Account Information: Account Name: %1 Account ...
  74. A Kerberos service ticket was issued, but it will be denied when Authentication Policy is enforced for a member of the Protected ...
  75. A Kerberos service ticket was renewed. Account Information: Account Name: %1 Account Domain: %2 Service Information: Service ...