Windows Server 2008
- Recording of {0} began late on {1} due to a temporary failure caused by either a system malfunction or a power loss and stopped ...
- Recording of {0} began late on {1} due to a temporary failure caused by either a system malfunction or a power loss and stopped ...
- Recording of {0} began late on {1} due to a temporary failure caused by either a system malfunction or a power loss and stopped ...
- Recording of {0} began late on {1} due to a temporary failure caused by either a system malfunction or a power loss and was ...
- Recording of {0} began late on {1} due to a temporary failure caused by either a system malfunction or a power loss and was ...
- Recording of {0} began late on {1} due to a temporary failure caused by either a system malfunction or a power loss and was ...
- Recording of {0} began late on {1} due to a temporary failure caused by either a system malfunction or a power loss and was ...
- Recording of {0} began late on {1} due to a temporary failure caused by either a system malfunction or a power loss. This ...
- Recording of {0} began on {1} while the program was already in progress and stopped early on {2} when a conflicting recording ...
- Recording of {0} began on {1} while the program was already in progress and stopped on {2} due to a lack of available disk ...
- Recording of {0} began on {1} while the program was already in progress and was interrupted when the computer lost power ...
- Recording of {0} began on {1} while the program was already in progress and was interrupted when the machine was powered ...
- Recording of {0} began on {1} while the program was already in progress and was stopped due to a lack of audio/video data. ...
- Recording of {0} began when requested on {1} while the program was already in progress and was manually stopped on {2} for ...
- Recording of {0} began when requested on {1} while the program was already in progress and was stopped because the recording ...
- RecordLog serves as an aggregation point for LogRecord objects. This class presents a higher level view of a log than its ...
- Records: - Flow: Used = %1!10lu! Returned = %2!10lu! InUse = %3!10lu! SlowFree Queued = %4!10lu! SlowFree Completed = %5!10lu! ...
- Recovery console: Allow automatic administrative logon This security setting determines if the password for the Administrator ...
- Recovery console: Allow floppy copy and access to all drives and all folders Enabling this security option makes the Recovery ...
- Recovery of data protection master key was attempted. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ...
- Recovery of data protection master key. Key Identifier: %1 Recovery Reason: %3 Recovery Server: %2 Recovery Key ID: %4 Failure ...
- Recovery of the application to the original location is not allowed because the application is not registered with Windows ...
- Recreating disks. This step recreates partitions and volumes on disks and fully formats the recreated volumes. This could ...
- Recursion: - Query: Queries Recursed = %1!10lu! Original Questions = %2!10lu! Additional Question = %3!10lu! Total Questions ...
- Redeploying this application will reinstall the application everywhere it is already installed. Do you want to continue? ...
- Redirect files from one directory to another. This shim accepts a list of directories to redirect, a list of directories ...
- Redirect messages are sent to indicate that the node which the packet was sent to is no longer the best gateway to reach ...
- Redirect registry keys from one branch to another. This shim accepts a list of branches to redirect, a list of branches to ...
- Reduces the size of the volume with focus by the specified amount. Makes free disk space available from unused space at the ...
- RedundancyStatus provides information on the state of the redundancy group. \"Fully Redundant\" (value=2) means that all ...
- Redundant Read} To satisfy a read request, the NT fault-tolerant file system successfully read the requested data from a ...
- Redundant Write} To satisfy a write request, the NT fault-tolerant file system successfully wrote a redundant copy of the ...
- Reference scope constraint '{0}' has been violated: the uri attribute value '{1}' in element '{2}' is not in the range of ...
- Referring to high-resolution patterns Y, X1 - X6, B1 and B2, enter the numbers of the columns in which the deviation of the ...
- Referring to high-speed printing mode patterns E, F, G, and H, enter the numbers of the columns in which the black and red ...
- Referring to the patterns printed in columns G and H, select the pattern that is smoothest and has no stripes in areas indicated ...
- Reflections with suspiciously long delay. If the room is very large, this is normal. Otherwise, calibration results may be ...
- Refresh rate in hertz. If a range of rates is supported, use the MinRefreshRate and MaxRefreshRate properties, and set RefreshRate ...
- Refresh the library, physical media or all devices of a particular media type. RSM REFRESH /L[G|F | /P[G|F | /TG The /[L|P|T]G ...
- Refreshes the properties of the object with with the values stored in the directory service (for public queues) or the local ...
- Refreshes the state of all disks in the selected pack, attempts recovery on disks in the invalid pack and resynchronizes ...
- Refreshes the state of all disks in the selected pack. Attempts recovery on disks in the invalid pack, and resynchronizes ...
- Refreshing connection details automatically on a frequent basis can impact server performance. To maximize server performance, ...
- REG ADD KeyName /v ValueName | /ve /t Type /s Separator /d Data /f KeyName \Machine\]FullKey Machine Name of remote machine ...
- REG COMPARE KeyName1 KeyName2 /v ValueName | /ve Output /s KeyName \Machine\]FullKey Machine Name of remote machine - omitting ...
- REG COPY KeyName1 KeyName2 /s /f KeyName \Machine\]FullKey Machine Name of remote machine - omitting defaults to the current ...
- REG DELETE KeyName /v ValueName | /ve | /va /f KeyName \Machine\]FullKey Machine Name of remote machine - omitting defaults ...
- REG EXPORT KeyName FileName /y Keyname ROOTKEY[\SubKey (local machine only). ROOTKEY HKLM | HKCU | HKCR | HKU | HKCC SubKey ...
- REG FLAGS KeyName QUERY | SET DONT_VIRTUALIZE DONT_SILENT_FAIL RECURSE_FLAG Keyname "HKLM\Software"[\SubKey (Restricted to ...
- REG IMPORT FileName FileName The name of the disk file to import (local machine only). Examples: REG IMPORT AppBkUp.reg Imports ...
- REG LOAD KeyName FileName KeyName ROOTKEY\SubKey (local machine only) ROOTKEY HKLM | HKU SubKey The key name to load the ...
- REG Operation Parameter List Operation QUERY | ADD | DELETE | COPY | SAVE | LOAD | UNLOAD | RESTORE | COMPARE | EXPORT | ...
- REG QUERY KeyName /v ValueName | /ve /s /f Data /k /d /c /e /t Type /z /se Separator KeyName \Machine\]FullKey Machine - ...
- REG RESTORE KeyName FileName KeyName ROOTKEY\SubKey (local machine only) ROOTKEY HKLM | HKCU | HKCR | HKU | HKCC SubKey The ...
- REG SAVE KeyName FileName /y KeyName ROOTKEY\SubKey ROOTKEY HKLM | HKCU | HKCR | HKU | HKCC SubKey The full name of a registry ...
- REG UNLOAD KeyName KeyName ROOTKEY\SubKey (local machine only) ROOTKEY HKLM | HKU SubKey The key name of the hive to unload. ...
- Register application as a protocol handler. The command line takes a series of 3 values, multiple Clients may be seperated ...
- Register online to get tips, tools, online training, and support resources designed to help your business get the most out ...
- Register online to get tips, tools, online training, and support resources designed to help your business get the most out ...
- Registered type library information is invalid. The library GUID, version, locale, or platform information may be corrupt. ...
- Registers and updates IP addresses and DNS records for this computer. If this service is stopped, this computer will not ...
- Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported ...
- Registration of this component failed. This component resides in a file which lacks self-registration code but for which ...
- Registry Editor could not retrieve the security information. The key currently selected does not give you access to retrieve ...
- Registry Editor could not save the security information. The key currently selected does not give you access to save such ...
- Registry Editor could not set security in all subkeys. The key currently selected contains one or more inaccessible subkeys. ...
- Registry Editor could not set security in all subkeys. The key currently selected contains one or more subkeys marked for ...
- Registry Editor could not set security in the key currently selected, or some of its subkeys. These keys do not give you ...
- Registry File Failure} The registry cannot load the hive (file): %hs or its log or alternate. It is corrupt, absent, or not ...
- Registry Hive Recovered} Registry hive (file): %hs was corrupted and it has been recovered. Some data might have been lost. ...
- Registry Hive Recovered} Registry hive (file): '%3' was corrupted and it has been recovered. Some data might have been lost. ...
- Registry key is under the HKEY_CURRENT_USER hive, Theoretically, if this is false, the class instance should be stored in ...
- Registry policy allows an administrator to configure registry settings of any type. This policy differs significantly from ...
- Registry Quota In Use is the percentage of the Total Registry Quota Allowed that is currently being used by the system. This ...
- Registry Recovery} One of the files containing the system's Registry data had to be recovered by use of a log or alternate ...