Windows Server 2008

  1. Pawns may only move forward one space, or two spaces if they haven't moved yet. Pawns may capture by moving forward and to ...
  2. Payload Id Type: ID_IPV4_ADDR is 1 - Id format is 1.2.3.4 ID_FQDN is 2 - Id format is ComputerName ID_IPV6_ADDR is 5 - Id ...
  3. PC NAVI 2000 2.01 has a known compatibility issue with this version of Windows. For an update that is compatible with this ...
  4. PCAnywhere 10.5 is incompatible with this version of Windows. Installing this application may render your system unable to ...
  5. PCI Express reported a fatal error. Device Identifier: Bus %1 Device %2 Function %3 Uncorrectable Error Status: %4 Correctable ...
  6. PCI Express reported a non-fatal error. Device Identifier: Bus %1 Device %2 Function %3 Uncorrectable Error Status: %4 Correctable ...
  7. PCIController is a superclass for the PCIBridge and PCIDevice classes. These classes model adapters and bridges on a PCI ...
  8. Peeks at a message with a LookupId property that is equal to the specified lookup identifier and has the optional parameters ...
  9. Peeks at the first message in the queue and has the optional parameters WantDestinationQueue (default set to False), WantBody ...
  10. Peeks at the last message in the queue and has the optional parameters WantDestinationQueue (default set to False), WantBody ...
  11. Peeks at the message following a message with a LookupId property that is equal to the specified lookup identifier and has ...
  12. Peeks at the message preceding a message with a LookupId property that is equal to the specified lookup identifier and has ...
  13. Peer caching is a BITS 3.0 feature which allows peers (same subnet computers with peer caching enabled) to share files. When ...
  14. Peer Name Resolution Protocol allows applications to register and resolve names on your computer so that other computers ...
  15. Peer Name Resolution Protocol allows applications to register and resolve names on your computer so that other computers ...
  16. Peer with IP address %1 was unable to receive RIP message sent out from interface with IP address %2. The peer might be rebooting, ...
  17. PEIMG cannot continue because the selected UI language (%1) doesn't have a corresponding language pack installed. This could ...
  18. PEIMG failed to use the servicing stack shim library (ssshim.dll) to locate a servicing stack that matches the target image ...
  19. PEIMG was not able to acquire backup and restore privileges required for servicing. Please retry with elevated privileges. ...
  20. PEIMG was not able to obtain write access to the Windows PE image specified. If this is a mounted WIM file, use the /mountrw ...
  21. PEIMG {Command} {Image} Flags Command /import | /inf | /install | /lang | /list | /prep | /uninstall | /scratchspace | /targetpath ...
  22. Pen Training could not find tablet pen hardware installed on your computer. Many of the features that are described in Pen ...
  23. Pending Device policy for the specified Windows Deployment Server has not been activated yet. To Activate the Pending Device ...
  24. People must have a user account and password for this computer to access files you have shared. To change this setting, use ...
  25. People must have a user account and password for this computer to access shared folders. To change this setting, use the ...
  26. People Near Me cannot make the required changes to your firewall settings. For assistance, contact your administrator or ...
  27. People Near Me cannot retain the configuration settings you made. For assistance, contact your administrator or technical ...
  28. People Near Me cannot retain your acceptance of the privacy policy. For assistance, contact your administrator or technical ...
  29. People Near Me cannot start the program, possibly because the program cannot be found, your computer does not have enough ...
  30. People Near Me identifies people nearby who are using computers and allows them to send you invitations for programs such ...
  31. People without a user account and password for this computer can access files you share with everyone. To change this setting, ...
  32. People without a user account and password for this computer can access folders shared with everyone. To change this setting, ...
  33. Per User Audit Policy Change: User: %1 Category: %2 Sub Category: %3 Sub Category Guid: %4 Changes: %5 Changed By: User Name: ...
  34. Per User Audit Policy was changed. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Policy For Account: ...
  35. Per user auditing policy set for user: Target user: %1 Policy ID: %2 Category Settings: System: %3 Logon: %4 Object Access ...
  36. Percentage of freespace that is fragmented on the volume. This property is deprecated because the computed value is unreliable. ...
  37. Perform access checks at the process and component level. Security property will be included on the object context. The COM+ ...
  38. Perform access checks only at the process level. Security property will not be included on the object context. COM+ security ...
  39. Perform volume maintenance tasks Description This security setting determines which users and groups can run maintenance ...
  40. Performance counter %1 has tripped its alert threshold. The counter value of %2 is over the limit value of %4. %4 is the ...
  41. Performance counter %1 has tripped its alert threshold. The counter value of %2 is under the limit value of %4. %4 is the ...
  42. Performance counters for the %1!s! (%2!s!) service are already in the registry, no need to reinstall. This only happens when ...
  43. Performance counters for the %1!s! (%2!s!) service were loaded successfully. The Record Data in the data section contains ...
  44. Performance counters for the %1!s! (%2!s!) service were removed successfully. The Record Data contains the new values of ...
  45. Performance counters will not be loaded because the named objects (shared memory or events) are in use for %1 for instance ...
  46. Performance Logs and Alerts Collects performance data from local or remote computers based on preconfigured schedule parameters, ...
  47. Performance Logs and Alerts Collects performance data from local or remote computers based on preconfigured schedule parameters, ...
  48. Performance monitoring cannot be initialized because the counters are not loaded or the shared memory object cannot be opened. ...
  49. Performance monitoring cannot be initialized for the gatherer object, because the counters are not loaded or the shared memory ...
  50. Performance monitoring cannot be initialized for the gatherer service, because the counters are not loaded or the shared ...
  51. Performance monitoring cannot be initialized for the topic assistant object, because the counters are not loaded or the shared ...
  52. Performance monitoring cannot be initialized. This affects performance counters only. Try restarting the service or restarting ...
  53. Performance monitoring for the plug-in cannot be initialized, because the counters are not loaded or the shared memory object ...
  54. Performance power management features on processor %1 are disabled due to a firmware problem. Check with the computer manufacturer ...
  55. Performance provides infrastructure for output caching by integrating the dynamic output-caching capabilities of ASP.NET ...
  56. Performance threshold values have been reached. Trap processing is being quiesed. Further traps will not be sent without ...
  57. Performance threshold values have been set by operator intervention. Current settings indicate performance thresholds have ...
  58. Performance warning: replication was delayed while applying changes to the following object. If this message occurs frequently, ...
  59. Performance warning: replication was delayed while applying changes to the following object. If this message occurs frequently, ...
  60. Performs conditional processing in batch programs. IF NOT ERRORLEVEL number command IF NOT string1=string2 command IF NOT ...
  61. Performs TCP/IP configuration for DHCP clients, including dynamic assignments of IP addresses, specification of the WINS ...
  62. PermanentAddress defines the network address hard coded into an adapter. This 'hard coded' address may be changed via firmware ...
  63. Permission information specifying who can join object %2 to a domain cannot be written because: %1 The computer account will ...
  64. Permissions compatible with pre-Windows 2000 servers will be used with this domain; this will allow anonymous access to domain ...
  65. Permissions on an object were changed. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: ...
  66. Permit this configuration change only if you trust its origin. It is recommended that you run a quick scan if you choose ...
  67. Persisting disk caches was slower than expected: Name : %3 Total Time : %4ms Degradation Time : %5ms Incident Time (UTC) ...
  68. Persona Grata commands are inaccessible when Persona Mode is set to Non-Grata. Please change Persona Mode to Grata before ...
  69. Persona Non-Grata commands are inaccessible when Persona Mode is set to Grata. Please change Persona Mode to Non-Grata before ...
  70. Personal Computer architecture Memory Mapped I/O. This class addresses both memory and port I/O resources. The property, ...
  71. Personally identifiable online and physical contact information, as well as to other information linked to an identifiable ...
  72. PFXInFileList - Comma separated PFX input file list EPF - EPF output file %1 - Use CAST 64 encryption %2 - Use CAST 64 encryption ...
  73. PFXInFileList - Comma separated PFX input file list PFXOutFile - PFX output file The password specified on the command line ...
  74. Phishing Filter has determined that this might be a phishing website. We recommend you do not give any of your information ...
  75. Phishing Filter is designed to warn you if the website you are visiting might be impersonating another website. What is Phishing ...