Windows Server 2008

  1. connection failed due to status code 14: Received an Authentication frame with authentication transaction sequence number ...
  2. connection failed due to status code 17: Association denied because AP is unable to handle additional associated stations ...
  3. connection failed due to status code 18: Association denied due to requesting station not supporting all of the data rates ...
  4. connection failed due to status code 25: Association denied due to requesting station not supporting the Short Slot Time ...
  5. connection failed due to status code 26: Association denied due to requesting station not supporting the DSSS-OFDM option ...
  6. Connection failed. Check that a network connection exists, that the computer name is valid, and that you are an administrator ...
  7. Connection Failures is the number of times TCP connections have made a direct transition to the CLOSED state from the SYN-SENT ...
  8. Connection Manager can not find a modem to dial out with. Please ensure that a modem is installed and configured for dial ...
  9. Connection Manager cannot continue because Dial-up Networking was not installed properly. You may need to install and configure ...
  10. Connection Manager cannot start because Point-to-Point Tunneling Protocol (PPTP) is not installed. Install Point-to-Point ...
  11. Connection Manager cannot start because Point-to-Point Tunneling Protocol (PPTP) is not installed. Please restart your computer, ...
  12. Connection Manager cannot start because Point-to-Point Tunneling Protocol (PPTP) is not installed. Please restart your computer, ...
  13. Connection Manager could not continue because RAS (Remote Access Service) was not installed properly. You may need to install ...
  14. Connection Manager could not start the RAS (Remote Access Authentication) services and therefore cannot continue. Check the ...
  15. Connection Manager has detected that your computer does not have the latest Connection Manager program files. The profile ...
  16. Connection Manager Profiles can be generated via the Connection Manager Administration Kit (CMAK). You can import a profile ...
  17. Connection Manager requires some components that are not installed on your computer. Do you want Connection Manager to install ...
  18. Connection Manager supports different features in a Connection Manager profile depending on what operating system is running ...
  19. Connection Manager was unable to launch CMMON32.EXE. Connecting is cancelled. For troubleshooting information, click Help. ...
  20. Connection Properties cannot be displayed at this time because %1 is accessing the same information. Please close the %1 ...
  21. Connection request policies allow you to designate whether connection requests are processed locally or forwarded to remote ...
  22. Connection requests can be authenticated locally or forwarded to a Remote Authentication Dial-In User Service (RADIUS) server ...
  23. Connection Session Timeouts is the number of connections that were dropped due to a session timeout. This number is an accumulator ...
  24. Connection to the remote server %1 has been disconnected by the server. Data can only be logged after a fresh connection ...
  25. Connection to the remote server could not be established. Windows System Resource Manager is not started on the remote server. ...
  26. Connections Active is the number of times TCP connections have made a direct transition to the SYN-SENT state from the CLOSED ...
  27. Connections Canceled is the number of connections that were canceled. This number is an accumulator and shows a running total. ...
  28. Connections customization allows you to deploy custom connections as well as set their associated per-connection information, ...
  29. Connections Established is the number of TCP connections for which the current state is either ESTABLISHED or CLOSE-WAIT. ...
  30. Connections from Endpoint 1 to Endpoint 2 will pass through the specified tunnel endpoints. Tunnel endpoints are generally ...
  31. Connections from Endpoint 1 to Endpoint 2 will pass through the specified tunnel endpoints. Tunnel endpoints are generally ...
  32. Connections from Endpoint 1 to Endpoint 2 will pass through the specified tunnel endpoints. Tunnel endpoints are generally ...
  33. Connections No Retries is the total count of connections that were successfully made on the first try. This number is an ...
  34. Connections Open is the number of connections currently open for this protocol. This counter shows the current count only ...
  35. Connections Passive is the number of times TCP connections have made a direct transition to the SYN-RCVD state from the LISTEN ...
  36. Connections Reset is the number of times TCP connections have made a direct transition to the CLOSED state from either the ...
  37. Connections which are automatically generated by Active Directory Domain Services are displayed as " " in the Active Directory ...
  38. Connections With Retries is the total count of connections that were made after retrying the attempt. A retry occurs when ...
  39. Connects Core counts the number of connections you have to servers running the original MS-Net SMB protocol, including MS-Net ...
  40. Connects to other computers, Internet telnet sites, bulletin board systems, online services, and host computers using either ...
  41. Consequently, you should consider either replacing the above permissions with fewer, more inclusive permissions, not applying ...
  42. Consider either replacing the above auditing entries with fewer, more inclusive auditing entries, not applying the auditing ...
  43. Consider either replacing the above permissions with fewer, more inclusive permissions, not applying the permissions to child ...
  44. Consider either replacing these auditing entries with fewer, more inclusive auditing entries, not applying the auditing entries ...
  45. Consider either replacing these auditing entries with fewer, more inclusive auditing entries, not applying the auditing entries ...
  46. Consider either replacing these permissions with fewer, more inclusive permissions, not applying the permissions to child ...
  47. Consider either replacing these permissions with fewer, more inclusive permissions, not applying the permissions to child ...
  48. Constraints are additional parameters of the network policy that are required to match the connection request. If a constraint ...
  49. Consult the help to make sure that the media you are using is compatible with the type of domain controller you are installing. ...
  50. Consult your NAS documentation for the correct attribute format, and then type the string in hexadecimal format. (Type 26; ...
  51. Contact = %1 was deleted successfully. Attempt to copy the new contact = %2 over it failed. The DTC configuration may be ...
  52. Contact the network administrator for "%ws" or the manufacturer of the wireless hardware on this computer for further assistance. ...
  53. Contact your administrator or product vendor for assistance. If there is a matching installation source, type it below or ...
  54. Contact your hardware manufacturer or network administrator for further assistance If you set up or own this network, you ...
  55. Contact your network administrator for further assistance The administrator has denied access to the networks currently in ...
  56. Contact your network administrator for further assistance The administrator has set the wireless connection mode setting ...
  57. Contact your network administrator for further assistance The administrator has set the wireless radio type setting for "%ws" ...
  58. Contact your network/DNS administrator to fix this problem. You can also manually add the A record that maps the computer ...
  59. Contact your networknetwork/DNS administrator to fix the problem. You can also manually add the records specified in the ...
  60. Contact your system administrator to determine if you need to repair or replace the disk, or get information from Microsoft ...
  61. Contains a serialized certitificate store containing all of the certificates from the machine's MY store which are valid ...
  62. Contains an array of data value types (integers). You can use these types to determine which Get method to call. For example, ...
  63. Contains information for the HKCR (this CLSID) key. If multiple patterns exist, they must be delimited by a semicolon, and ...
  64. Contains the expanded string data value for the named value. The string is only expanded if the environment variable (for ...
  65. Contains the key to be created. The CreateKey method creates all subkeys specified in the path that do not exist. For example, ...
  66. Content Advisor is not enabled because you are not currently using any rating system. To choose a rating system, click the ...
  67. Content Advisor is not installed on this computer. To install it, click Settings. After Content Advisor is installed, only ...
  68. Content index metadata on drive %3 is corrupt. Index will be automatically restored. Running chkdsk /f is recommended.%1 ...
  69. Content of product provides user with specific skills development or reinforcement learning within an entertainment setting. ...
  70. Content provided by All Music Guide. 2001 AEC One Stop Group, Inc. All Music Guide is a registered trademark of AEC One Stop ...
  71. Content ratings allow you to prevent users from viewing sites with risky content. Ratings are set on a per-site basis and ...
  72. Content that sets a bad example for young children, teaching or encouraging children to perform harmful acts or imitate dangerous ...
  73. Content that sets a bad example for young children, teaching or encouraging children to perform harmful acts or imitate dangerous ...
  74. Content within this application coming from the Web site listed below is being blocked by Internet Explorer Enhanced Security ...
  75. Context Blocks Queued per second is the rate at which work context blocks had to be placed on the server's FSP queue to await ...