Windows Server 2008

  1. Number of downstream Ports on the Hub, including those embedded in the Hub's silicon. Individual USBPorts are associated ...
  2. Number of hard resets issued by the controller. A hard reset returns the device to its initialization or 'boot-up' state. ...
  3. Number of input async framing errors. These can be caused by a noisy transmission line. Using a smaller packet size may help ...
  4. Number of input async overrun errors. These can be caused by the baud rate being faster than the computer can handle, or ...
  5. Number of input compression dictionary flushes. When the data can not be compressed, the compression dictionary is flushed ...
  6. Number of kilobytes of virtual memory currently unused and available. For example, this may be calculated by adding the amount ...
  7. Number of kilobytes of virtual memory. For example, this may be calculated by adding the amount of total RAM to the amount ...
  8. Number of object property values containing Distinguished Names sent to outbound replication partners. DN-values, such as ...
  9. Number of object property values received from inbound replication partners that are Distinguished Names; i.e., that reference ...
  10. Number of objects looked at by outbound replication that were determined to have no updates that the outbound partner did ...
  11. Number of output compression dictionary flushes. When the data can not be compressed, the compression dictionary is flushed ...
  12. Number of SCSI retries that have occurred since last hard or soft reset related to the controlled Device. The time of last ...
  13. Number of SCSI timeouts that have occurred since last hard or soft reset related to the controlled Device. The time of last ...
  14. Number of search suboperations per second. One search operation is made up of many sub operations. A sub operation roughly ...
  15. Number of Security Descriptor Propagation suboperations per second. One Security Descriptor Propagation operation is made ...
  16. Number of soft resets issued by the controller. A soft reset does not completely clear current device state and/or data. ...
  17. Number of System State Backups found: %1!lu! Number of copies specified to keep: %2!lu! Hence, there is no need to delete ...
  18. o fileaccess=mode To specify the permission mode of the file. These are used for new files created on NFS servers. Specified ...
  19. o rsize=size To set the size of the read buffer in kilobytes. -o wsize=size To set the size of the write buffer in kilobytes. ...
  20. Object "%1" cannot be deleted because an open window is displaying its properties. To delete this object, close that window ...
  21. Object %1 is a Trusted domain object. To remove trusts use the Active Directory Domains and Trusts snapin. Do you want to ...
  22. Object Access Attempt: Object Server: %1 Handle ID: %2 Object Type: %3 Process ID: %4 Image File Name: %5 Accesses: %6 Access ...
  23. Object being moved across-domains is already known to be deleted by the destination server. The source server does not have ...
  24. Object of type "{0}" is not legal or not in the correct sequence. This is likely caused by a user-specified "{1}" command ...
  25. Object Open for Delete: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: {%5,%6} Process ID: ...
  26. Object Open: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: %5 Process ID: %6 Image File Name: ...
  27. Object Open: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: {%5,%6} Process ID: %7 Process ...
  28. Object Operation: Object Server: %1 Operation Type: %2 Object Type: %3 Object Name: %4 Handle ID: %5 Primary User Name: %6 ...
  29. ObjectId - ObjectId to display or to add display name GroupId - decimal GroupId number for ObjectIds to enumerate AlgId - ...
  30. OBJECTID Commands Supported - query Query the object identifier set Change the object identifier delete Delete the object ...
  31. Obscured or implied sexual acts and visible sexual touching in an artistic, medical, educational, sports or news context. ...
  32. Obscured or implied sexual acts, visible sexual touching, and passionate kissing in any context. Explicit sexual context ...
  33. OCSETUP OCSETUP /uninstall /passive /unattendfile: /quiet /norestart /log: /x: /?, /h, /help - Display help information. ...
  34. OCSP Responder Services did not process an extremely long request from %1. This may indicate a denial-of-service attack. ...
  35. OCSP Revocation Provider successfully updated the revocation information. CA Configuration ID: %1 Base CRL Number: %2 Base ...
  36. ODBC Logging provides infrastructure that supports logging Web server activity to an ODBC-compliant database. With a logging ...
  37. Of %1 files within %2 directories %3 are compressed and %4 are not compressed. %5 total bytes of data are stored in %6 bytes. ...
  38. off-line read scanning implemented bit) - If this bit is cleared to zero, the device does not support off-line read scanning. ...
  39. Offers the latest critical and security updates, device drivers, and other features that are available for your Windows computer. ...
  40. OfficeScan Corporate Edition is incompatible with this version of Windows. For more information, contact Trend Micro, INC. ...
  41. Offline changes to '%1' have not been synced. By deleting the offline version, these changes will be lost. Do you wish to ...
  42. Offline Files allows you to access network files while working offline. To set up Offline Files open a network folder, right ...
  43. Offline files are local copies of network files that you specifically made available offline, enabling you to access them ...
  44. Offline items were not updated because a connection to the Internet could not be made because File Sharing for Microsoft ...
  45. Offline pages are webpages that are stored on your computer so you can view them without being connected to the Internet. ...
  46. Offloaded Bytes Received per second is the rate of bytes received using IPsec hardware offload. Certain network adapters ...
  47. Offloaded Bytes Sent per second is the rate of bytes sent using IPsec hardware offload. Certain network adapters can accelerate ...
  48. Offloaded Security Associations is the number of active Quick Mode security associations offloaded to hardware. Certain network ...
  49. Offset and length were out of bounds for the array or count is greater than the number of elements from index to the end ...
  50. Often, a cooling device is installed in a package such as a chassis or a rack, not for a specific device, but to assist in ...
  51. Often, a temperature sensor is installed in a package such as a chassis or a rack, not to measure any particular device, ...
  52. Often, an alarm device is installed as part of a package, not to indicate issues with any particular logical device or physical ...
  53. OID "%1" defined for object %2 conflicts with the schema extensions needed for Windows Server 2008. Status/Consequence Adprep ...
  54. OLE (Object Linking and Embedding) in the application "%1" was trying to convert embedded content in a document; however, ...
  55. Omitted duplicate property. Keeping: '%1' (%2) Publisher: '%3' Product: '%4' URL: '%5' Omitting: '%6' (%7) Publisher: '%8' ...
  56. on %2 could not remove the print job submitted by %3 on %4 because the user does not have the Manage Documents permission. ...
  57. On a computer with Windows Vista or a later version of Windows, this option allows unsecured communication to be sent anytime ...
  58. On a Windows 2000, Windows XP, or Windows 2003 computer, this option allows unsecured communications to be sent only when ...
  59. On basic GUID partition table (GPT) disks, assigns the GPT attribute(s) to the partition with focus. Syntax: GPT ATTRIBUTES= ...
  60. On basic master boot record (MBR) disks, marks the partition with focus as active. Syntax: ACTIVE This informs the basic ...
  61. On basic master boot record (MBR) disks, marks the partition with focus as inactive. Syntax: INACTIVE The computer may start ...
  62. On directory servers, Ntds.dit and Edb.log should be the most active files. In this case, {file} has the highest I/O rate ...
  63. On domain controllers this service enables users to log on to the network using the Kerberos authentication protocol. If ...
  64. On input, RequestLength is the length (in octets) of the Descriptor that should be returned. If this value is less than the ...
  65. On some computers, displaying the Preview window during the video import can affect the quality of the imported video. If ...
  66. On the Autoplay menu, click "Windows Easy Transfer," and Windows Easy Transfer will start automatically. Follow the instructions ...
  67. On the next screen, you will be asked to press one or more buttons on your set-top box remote control. If your set-top box ...
  68. On the next screen, you will be asked to press one or more buttons on your set-top box remote control. Make sure you hold ...
  69. On the Security tab, select the Web content zone you want to adjust: Internet, Local intranet, Trusted sites, or Restricted ...
  70. On the Sync tab, create a list of items you want to add to your device, and then click Start Sync. Repeat this step every ...
  71. On UNIX computers, passwords are stored in an encrypted form. All the UNIX computers in the domain must use the same encryption ...
  72. On Windows 9x when you copy a high color bitmap onto the clipboard, it always gets converted to a 24-bit DIB when the CF_DIB ...
  73. On-Screen Keyboard is intended to provide a minimum level of functionality for users with limited mobility. Users with limited ...
  74. On-Screen Keyboard lets you type and use your computer using an alternative input device, like a switch, rather than the ...
  75. On-Screen Keyboard makes it possible to type using the mouse or another pointing device by clicking keys on a picture of ...