Windows 7

  1. This computer's Computer Name is set to the pre-Windows 2000 NetBIOS name. The Computer Name is the first label of the full ...
  2. This computer's Computer Name is set to the pre-Windows NetBIOS name. The Computer Name is the first label portion of the ...
  3. This computer's Computer Name is set to the pre-Windows NetBIOS name. The Computer Name is the first label portion of the ...
  4. This computer's Computer Name is set to the pre-Windows NetBIOS name. The Computer Name is the first label portion of the ...
  5. This computer's Computer Name is set to the pre-Windows NetBIOS name. The Computer Name is the first portion of the full ...
  6. This computer's hardware may not support booting to this disk. Ensure that the disk's controller is enabled in the computer's ...
  7. This computer's system root is on a dynamic disk. This version of the Windows Deployment Services Image Capture Wizard does ...
  8. This condition will always be true as the memory specified is less than current system Memory. Do you want to continue? (Y/N) ...
  9. This condition will always be true as the number of processors specified is less than current number of processors in the ...
  10. This condition will always be true because the memory specified is less than current system memory. Do you want to continue? ...
  11. This condition will always be true because the number of processors specified is less than current number of processors in ...
  12. This configuration does not allow access to the management operating system through this network adapter. Make sure remote ...
  13. This configuration file does not contain any %1% configuration. To import a %2%, you need to select a file that contains ...
  14. This configuration section cannot be modified at this path because allowSubDirConfig="false" is set on the parent virtual ...
  15. This configuration section cannot be used at this path. This happens when the section is locked at a parent level. Locking ...
  16. This connection is configured to validate the identity of the access server, but Windows cannot verify the digital certificate ...
  17. This connection requires security features that are not available on this platform. For information, contact customer support. ...
  18. This connection was automatically generated by the Active Directory Domain Services. Changes to this connection will be overwritten ...
  19. This connection was automatically generated by the Active Directory Domain Services. Changes to this connection will be overwritten. ...
  20. This connection was configured to use a data encryption strength that is not supported by the installed software. The security ...
  21. This console file was saved with a previous version of the IP Security Monitor snap-in that is not compatible with the current ...
  22. This console file was saved with a previous version of the snapin and is not compatible. The settings could not be restored. ...
  23. This contact has been modified in both Windows Contacts and your Hotmail Address Book, and the items below have conflicting ...
  24. This content cannot be played because critical files that are required for video playback have been corrupted. To restore ...
  25. This content might not be displayed properly. The file was restricted because the content doesn't match its security information. ...
  26. This Control Panel cannot be run without Internet Explorer Version 5 or greater. Please install a newer version of Internet ...
  27. This copy of the AOL software was intended for use on earlier versions of the Windows operating system. Please click 'Continue' ...
  28. This copy of the AOL software was intended for use on earlier versions of the Windows operating system. You may be unable ...
  29. This copy of the CompuServe software was intended for use on earlier versions of the Windows operating system. Please click ...
  30. This copy of the CompuServe software was intended for use on earlier versions of the Windows operating system. You may be ...
  31. This copy of Windows is not genuine. To receive the full protection of this program, you must verify that your copy of Windows ...
  32. This could be because your username and password are incorrect, or because a username and password are not required. Check ...
  33. This counter displays the number of net user and new local groups evaluations per second when performing a non-transitive ...
  34. This counter displays the number of new groups encountered per second when performing a transitive membership evaluation. ...
  35. This counter displays the number of universal group membership evaluations per second on a global catalog domain controller ...
  36. This counter represents the total number of times that any partition has been throttled, which is to say that its interrupts ...
  37. This counter tracks the number of Authentiation Service (AS) requests that are being processed by the Key Distribution Center ...
  38. This counter tracks the number of context handles in use by a given process. Context handles are associated with security ...
  39. This counter tracks the number of credential handles in use by a given process. Credential handles are handles to pre-existing ...
  40. This counter tracks the number of Kerberos requests that a read-only domain controller (RODC) forwards to its hub, per second. ...
  41. This counter tracks the number of NTLM authentications processed per second for the AD on this DC or for local accounts on ...
  42. This counter tracks the number of Secure Sockets Layer (SSL) client-side reconnect handshakes that are being processed per ...
  43. This counter tracks the number of Secure Sockets Layer (SSL) entries that are currently stored in the secure channel (Schannel) ...
  44. This counter tracks the number of Secure Sockets Layer (SSL) entries that are currently stored in the secure channel (Schannel) ...
  45. This counter tracks the number of Secure Sockets Layer (SSL) full client-side handshakes that are being processed per second. ...
  46. This counter tracks the number of Secure Sockets Layer (SSL) full server-side handshakes that are being processed per second. ...
  47. This counter tracks the number of Secure Sockets Layer (SSL) server-side reconnect handshakes that are being processed per ...
  48. This counter tracks the number of ticket-granting service (TGS) requests that are being processed by the Key Distribution ...
  49. This cross-ref has a non-standard dNSRoot attribute. Cross-ref DN: %2 nCName attribute (Partition name): %1 Bad dNSRoot attribute: ...
  50. This cross-ref has an invalid nETBIOSName attribute. Cross-ref DN: %2 nCName attribute (Partition name): %1 Bad nETBIOSName ...
  51. This custom selection is currently selected in another application. Change the selection in the other application before ...
  52. This data collector set collects Active Directory related data on your local system. The data to be collected includes registry ...
  53. This data collector set collects Health Registration Authority (HRA) related data on your local system. The data to be collected ...
  54. This data collector set collects LAN service related data on your local system. The data to be collected includes wired debug ...
  55. This data collector set collects network related data on your local system. The data to be collected includes network component ...
  56. This data collector set collects wireless service related data on your local system. The data to be collected includes wireless ...
  57. This data is available only if the Group Policy Modeling simulation is processed on a domain controller with Q816453 installed. ...
  58. This data was generated the last time the user executed the Add / Remove Programs control panel applet. To ensure that this ...
  59. This database couldn't be created because no template file was selected. To Open an Existing Database Right click on the ...
  60. This default text is used as part of the name for each of the policies created with this wizard. You can use the default ...
  61. This default text is used as part of the name for each of the policies created with this wizard. You can use the default ...
  62. This destination already contains a folder named '%1'. If any files have the same names, you will be asked if you want to ...
  63. This destination already contains a read-only folder named '%1'. If any files have the same names, you will be asked if you ...
  64. This destination already contains a system folder named '%1'. If any files have the same names, you will be asked if you ...
  65. This device can display pictures, but you must add them to the library before the pictures can be synchronized to the device. ...
  66. This device can not eject at this time as there will be no remaining power sources (batteries) to keep the computer running ...
  67. This device cannot be stopped because one of its components (%s) was unplugged when a program was still using it. Close that ...
  68. This device cannot find enough free resources that it can use. If you want to use this device, you will need to disable one ...
  69. This device cannot find enough free resources that it can use.%s If you want to use this device, you will need to disable ...
  70. This device caused a delay in the system shutdown process: File Name : %3 Friendly Name : %5 Version : %7 Total Time : %8ms ...
  71. This device has already been configured. To configure it again, first reset the device by restoring its factory settings. ...
  72. This device has been previously synchronized with a newer version of Windows. Synchronizing with this version of Windows ...
  73. This device is already synchronized with another computer. Do you want to create a new synchronization and replace the previous ...
  74. This device is no longer functioning properly and may need to be replaced. Contact the manufacturer of this device for assistance. ...
  75. This device is not set up to sync with your computer. The sync settings may have been deleted by another program. Try setting ...