Windows Server 2003
			
				
					
- User Time is the percentage of elapsed time that the process threads spent executing code in user mode. Applications, environment ...
 
- User Time is the percentage of elapsed time that this thread has spent executing code in user mode. Applications, environment ...
 
- User Time is the percentage of elapsed time the processor spends in the user mode. User mode is a restricted processing mode ...
 
- User to be notified upon job completion or failure. This property is restricted to 16 characters under Windows 9x platforms. ...
 
- UserKeyAndCertFile - Data file containing user private keys and certificates to be archived. This can be any of the following: ...
 
- Users are prevented from making accidental or intentional system-wide changes. Thus, Users can run certified applications, ...
 
- Users in the local domain can be authenticated to use all of the resources in the specified domain or only those resources ...
 
- Users in the local forest can be authenticated to use all of the resources in the specified forest or only those resources ...
 
- Users in the specified domain can be authenticated to use all of the resources in the local domain or only those resources ...
 
- Users in the specified forest can be authenticated to use all of the resources in the local forest or only those resources ...
 
- Users trying to reconnect to this share (%1\%2) will need to supply the correct new password to succeed. Failure to do so ...
 
- Users With a Damaged Start Menu or Desktop The Start menu or desktop for the following user accounts is inaccessible or incomplete ...
 
- Users With a Damaged Start Menu or Desktop The Start menu or desktop for the following user accounts is inaccessible or incomplete ...
 
- Users with limited accounts cannot always install programs. Depending on the program, a user might need administrator privileges ...
 
- user`u`user password]`User to Run As. Entering a for the password produces a prompt for the password. The password is not ...
 
- Using a directory service to check the e-mail addresses of your message recipients may slow down the performance of your ...
 
- Using a PIN to encrypt the pre-shared key increases the security of your deployment. Users will need the PIN in order to ...
 
- Using a server-based sign-up method, you can completely control the users sign-up experience via files on the server. The ...
 
- Using automatic certificate requests, an administrator can specify which types of certificate can be automatically requested ...
 
- Using Internet Gateway, you can use this computer to control the Internet connection for your network. To run Internet Gateway ...
 
- Using servers for Internet browsing does not adhere to sound security practices because Internet browsing increases the exposure ...
 
- Using the DISABLE command, you can disable a Windows system service or driver. DISABLE servicename servicename The name of ...
 
- Using the ENABLE command, you can enable a Windows system service or driver. ENABLE servicename start_type servicename The ...
 
- Using the following variables, you can create a format for automatically generating custom computer names for new installations: ...
 
- Using TTL scoping is not recommended. By enabling TTL scoping, you sacrifice bandwidth in your network, since data will be ...
 
- Using your current location and calling card selection, dialing this number could result in a emergency services call to ...
 
- Using |technologies |such |as |the |Microsoft |.NET |Framework, |developers |can |employ |multiple |languages |in |single ...
 
- USN journal for volume %1 cannot be created because the disk is too full. This volume cannot be managed by Remote Storage. ...
 
- Utility Manager cannot start this application on the secure desktop. Contact your system Administrator for sufficient permissions. ...
 
- Utility Manager was produced for Microsoft Corporation by ECO Kommunikation, makers of Braille-, speech-based and other access ...
 
- Vendor ID: %1!s! Qualifier: 2!08x! Version: 3!08x! Global Flags: 4!08x! Num Data Entries: %5!d! File ID: %6!s! Data: Flags: ...
 
- Verification of the trust between the domain %2 and the domain %3 was unsuccessful because: %1 Resetting the trust passwords ...
 
- Verification of the trust between the domain %2 and the domain %3 was unsuccessful because: %1 To repair a trust to a pre-Windows ...
 
- Verification reads the backed-up data to verify its integrity. This step takes extra time, but verification helps ensure ...
 
- verifier /flags FLAGS /iolevel IOLEVEL /all verifier /flags FLAGS /iolevel IOLEVEL /driver NAME NAME . verifier /reset verifier ...
 
- Verifying Disk} The media has changed and a verify operation is in progress so no reads or writes may be performed to the ...
 
- Version overlap with previous version redirection while parsing policy file %1 where oldVersion is %2 and newVersion is %3. ...
 
- Version Signature = "$Windows NT$" Components NetOC=netoc.dll,NetOcSetupProc,netoc.inf Global WindowTitle=Windows Setup - ...
 
- Versions of Windows that require LAN Manager authentication include Windows for Workgroups, Windows CE 4.0, and Windows 95, ...
 
- Very sorry, this Task has not yet been implemented. We are working hard to get these done for you. Email [email protected] ...
 
- Video cannot be shown on the computer monitor because of one of the following reasons: a) Low video memory. Please try using ...
 
- View all instances of a specific object type. RSM VIEW /T[DRIVE|LIBRARY|CHANGER|STORAGESLOT|IEDOOR|IEPORT|PHYSICAL_MEDIA| ...
 
- View and filter NetBIOS name registrations for client names used on your network; add and configure replication partners; ...
 
- View and manage Sites and Services. Sites define the topology and schedules used for Active Directory replication. Services ...
 
- View one or more access points for this service by clicking a binding name. You can then view interfaces and instance information ...
 
- Virtual Bytes is the current size, in bytes, of the virtual address space the process is using. Use of virtual address space ...
 
- Virtual Bytes Peak is the maximum size, in bytes, of virtual address space the process has used at any one time. Use of virtual ...
 
- Virtual Circuit Closed} An existing connection (virtual circuit) has been broken at the remote computer. There is probably ...
 
- Virtual Circuit Closed} The network transport on a remote computer has closed a network connection. There may or may not ...
 
- Virtual Circuit Closed} The network transport on your computer has closed a network connection because it had to wait too ...
 
- Virtual Circuit Closed} The network transport on your computer has closed a network connection. There may or may not be I/O ...
 
- Virtual Memory Minimum Too Low} Your system is low on virtual memory. Windows is increasing the size of your virtual memory ...
 
- Virtual private connections to your computer through the Internet are possible only if your computer has a known name or ...
 
- Virtual Site '%1' can not be started because IIS's running virtual site limit for this operating system platform has all ...
 
- Virtual site '%1' is configured to truncate its log every '%2' bytes. Since this value must be at least 1048576 bytes ( 1 ...
 
- Virtual Site '%1' is configured with MaxConnections equal to '%2'. On this operating system platform IIS only supports 40 ...
 
- Volume %1!s! has %2!d!% free space, but <1% is available for use by Disk Defragmenter (due to reserved system space). To ...
 
- Volume %1!s! has %2!d!% free space, but only %3!d!% is available for use by Disk Defragmenter (due to reserved system space). ...
 
- Volume %1!s! has <1% free space available for use by Disk Defragmenter. To run effectively, Disk Defragmenter requires at ...
 
- Volume %1!s! has a 12-bit FAT partition. Disk Defragmenter does not support 12-bit FAT partitions. To use Disk Defragmenter, ...
 
- Volume %1!s! has only %2!d!% free space available for use by Disk Defragmenter. To run effectively, Disk Defragmenter requires ...
 
- Volume information for this disk cannot be found. This may happen if the disk is a 1394 or a USB device on a Windows 2000 ...
 
- Volume shadow copy creation has continued to report errors after trying %d times. The backup will continue, but the data ...
 
- Volume shadow copy creation has encountered one or more errors. The backup will continue, but the data for these components ...
 
- Volume Shadow Copy Service error: A component was added to the backup document that does not exist in any writer's metadata. ...
 
- Volume Shadow Copy Service error: A critical component required by the Volume Shadow Copy service is not registered. This ...
 
- Volume Shadow Copy Service error: An internal inconsistency was detected in trying to contact shadow copy service writers. ...
 
- Volume Shadow Copy Service error: An unexpected error was encountered cloning a document. The cloned document has no children. ...
 
- Volume Shadow Copy Service error: An unexpected error was encountered examining the XML document. The document is missing ...
 
- Volume Shadow Copy Service error: An unexpected error was encountered examining the XML document. The document is missing ...
 
- Volume Shadow Copy Service error: An unexpected error was encountered when calling QueryInterface for IVssAsync. hr = %1. ...
 
- Volume Shadow Copy Service error: An unexpected error was encountered when QueryInterface for IDispatch was called. hr = ...
 
- Volume Shadow Copy Service error: Cannot find diff areas for creating shadow copies. Please add at least one NTFS drive to ...
 
- Volume Shadow Copy Service error: Cannot find diff areas for creating shadow copies. Please add at least one NTFS drive to ...
 
- Volume Shadow Copy Service error: Cannot find diff areas for creating shadow copies. Please add at least one NTFS drive to ...