Windows Server 2008
- Number of downstream Ports on the Hub, including those embedded in the Hub's silicon. Individual USBPorts are associated ...
- Number of hard resets issued by the controller. A hard reset returns the device to its initialization or 'boot-up' state. ...
- Number of input async framing errors. These can be caused by a noisy transmission line. Using a smaller packet size may help ...
- Number of input async overrun errors. These can be caused by the baud rate being faster than the computer can handle, or ...
- Number of input compression dictionary flushes. When the data can not be compressed, the compression dictionary is flushed ...
- Number of kilobytes of virtual memory currently unused and available. For example, this may be calculated by adding the amount ...
- Number of kilobytes of virtual memory. For example, this may be calculated by adding the amount of total RAM to the amount ...
- Number of object property values containing Distinguished Names sent to outbound replication partners. DN-values, such as ...
- Number of object property values received from inbound replication partners that are Distinguished Names; i.e., that reference ...
- Number of objects looked at by outbound replication that were determined to have no updates that the outbound partner did ...
- Number of output compression dictionary flushes. When the data can not be compressed, the compression dictionary is flushed ...
- Number of SCSI retries that have occurred since last hard or soft reset related to the controlled Device. The time of last ...
- Number of SCSI timeouts that have occurred since last hard or soft reset related to the controlled Device. The time of last ...
- Number of search suboperations per second. One search operation is made up of many sub operations. A sub operation roughly ...
- Number of Security Descriptor Propagation suboperations per second. One Security Descriptor Propagation operation is made ...
- Number of soft resets issued by the controller. A soft reset does not completely clear current device state and/or data. ...
- Number of System State Backups found: %1!lu! Number of copies specified to keep: %2!lu! Hence, there is no need to delete ...
- o fileaccess=mode To specify the permission mode of the file. These are used for new files created on NFS servers. Specified ...
- o rsize=size To set the size of the read buffer in kilobytes. -o wsize=size To set the size of the write buffer in kilobytes. ...
- Object "%1" cannot be deleted because an open window is displaying its properties. To delete this object, close that window ...
- Object %1 is a Trusted domain object. To remove trusts use the Active Directory Domains and Trusts snapin. Do you want to ...
- Object Access Attempt: Object Server: %1 Handle ID: %2 Object Type: %3 Process ID: %4 Image File Name: %5 Accesses: %6 Access ...
- Object being moved across-domains is already known to be deleted by the destination server. The source server does not have ...
- Object of type "{0}" is not legal or not in the correct sequence. This is likely caused by a user-specified "{1}" command ...
- Object Open for Delete: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: {%5,%6} Process ID: ...
- Object Open: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: %5 Process ID: %6 Image File Name: ...
- Object Open: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: {%5,%6} Process ID: %7 Process ...
- Object Operation: Object Server: %1 Operation Type: %2 Object Type: %3 Object Name: %4 Handle ID: %5 Primary User Name: %6 ...
- ObjectId - ObjectId to display or to add display name GroupId - decimal GroupId number for ObjectIds to enumerate AlgId - ...
- OBJECTID Commands Supported - query Query the object identifier set Change the object identifier delete Delete the object ...
- Obscured or implied sexual acts and visible sexual touching in an artistic, medical, educational, sports or news context. ...
- Obscured or implied sexual acts, visible sexual touching, and passionate kissing in any context. Explicit sexual context ...
- OCSETUP OCSETUP /uninstall /passive /unattendfile: /quiet /norestart /log: /x: /?, /h, /help - Display help information. ...
- OCSP Responder Services did not process an extremely long request from %1. This may indicate a denial-of-service attack. ...
- OCSP Revocation Provider successfully updated the revocation information. CA Configuration ID: %1 Base CRL Number: %2 Base ...
- ODBC Logging provides infrastructure that supports logging Web server activity to an ODBC-compliant database. With a logging ...
- Of %1 files within %2 directories %3 are compressed and %4 are not compressed. %5 total bytes of data are stored in %6 bytes. ...
- off-line read scanning implemented bit) - If this bit is cleared to zero, the device does not support off-line read scanning. ...
- Offers the latest critical and security updates, device drivers, and other features that are available for your Windows computer. ...
- OfficeScan Corporate Edition is incompatible with this version of Windows. For more information, contact Trend Micro, INC. ...
- Offline changes to '%1' have not been synced. By deleting the offline version, these changes will be lost. Do you wish to ...
- Offline Files allows you to access network files while working offline. To set up Offline Files open a network folder, right ...
- Offline files are local copies of network files that you specifically made available offline, enabling you to access them ...
- Offline items were not updated because a connection to the Internet could not be made because File Sharing for Microsoft ...
- Offline pages are webpages that are stored on your computer so you can view them without being connected to the Internet. ...
- Offloaded Bytes Received per second is the rate of bytes received using IPsec hardware offload. Certain network adapters ...
- Offloaded Bytes Sent per second is the rate of bytes sent using IPsec hardware offload. Certain network adapters can accelerate ...
- Offloaded Security Associations is the number of active Quick Mode security associations offloaded to hardware. Certain network ...
- Offset and length were out of bounds for the array or count is greater than the number of elements from index to the end ...
- Often, a cooling device is installed in a package such as a chassis or a rack, not for a specific device, but to assist in ...
- Often, a temperature sensor is installed in a package such as a chassis or a rack, not to measure any particular device, ...
- Often, an alarm device is installed as part of a package, not to indicate issues with any particular logical device or physical ...
- OID "%1" defined for object %2 conflicts with the schema extensions needed for Windows Server 2008. Status/Consequence Adprep ...
- OLE (Object Linking and Embedding) in the application "%1" was trying to convert embedded content in a document; however, ...
- Omitted duplicate property. Keeping: '%1' (%2) Publisher: '%3' Product: '%4' URL: '%5' Omitting: '%6' (%7) Publisher: '%8' ...
- on %2 could not remove the print job submitted by %3 on %4 because the user does not have the Manage Documents permission. ...
- On a computer with Windows Vista or a later version of Windows, this option allows unsecured communication to be sent anytime ...
- On a Windows 2000, Windows XP, or Windows 2003 computer, this option allows unsecured communications to be sent only when ...
- On basic GUID partition table (GPT) disks, assigns the GPT attribute(s) to the partition with focus. Syntax: GPT ATTRIBUTES= ...
- On basic master boot record (MBR) disks, marks the partition with focus as active. Syntax: ACTIVE This informs the basic ...
- On basic master boot record (MBR) disks, marks the partition with focus as inactive. Syntax: INACTIVE The computer may start ...
- On directory servers, Ntds.dit and Edb.log should be the most active files. In this case, {file} has the highest I/O rate ...
- On domain controllers this service enables users to log on to the network using the Kerberos authentication protocol. If ...
- On input, RequestLength is the length (in octets) of the Descriptor that should be returned. If this value is less than the ...
- On some computers, displaying the Preview window during the video import can affect the quality of the imported video. If ...
- On the Autoplay menu, click "Windows Easy Transfer," and Windows Easy Transfer will start automatically. Follow the instructions ...
- On the next screen, you will be asked to press one or more buttons on your set-top box remote control. If your set-top box ...
- On the next screen, you will be asked to press one or more buttons on your set-top box remote control. Make sure you hold ...
- On the Security tab, select the Web content zone you want to adjust: Internet, Local intranet, Trusted sites, or Restricted ...
- On the Sync tab, create a list of items you want to add to your device, and then click Start Sync. Repeat this step every ...
- On UNIX computers, passwords are stored in an encrypted form. All the UNIX computers in the domain must use the same encryption ...
- On Windows 9x when you copy a high color bitmap onto the clipboard, it always gets converted to a 24-bit DIB when the CF_DIB ...
- On-Screen Keyboard is intended to provide a minimum level of functionality for users with limited mobility. Users with limited ...
- On-Screen Keyboard lets you type and use your computer using an alternative input device, like a switch, rather than the ...
- On-Screen Keyboard makes it possible to type using the mouse or another pointing device by clicking keys on a picture of ...