The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, places, or events is intended or should be inferred.
The event-to-trap settings are locked. This usually happens when another application either terminated unexpectedly or it ...
The EventCharacter specifies the value of the control character that is used to signal an event, such as end of file. Example: ...
The EventSystem sub system is suppressing duplicate event log entries for a duration of %1 seconds. The suppression timeout ...
The exact error is unknown. Make a note of this error code, which might be useful if you seek additional help to resolve ...
The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted ...
The ExceedNotification property indicates whether or not events will be written to the event log when quotas are exceeded. ...
The exclusive resource string %1!s! for the partial configuration %2!s! is not written in any of the allowed formats. Exclusive ...
The executable file must be built for the processor architecture on which it is installed. Some executable files might run ...
The execution of the setup program for application %1 from policy %2 failed. The setup path was %3 and the error was : %4 ...