Windows Server 2008

  1. Recording of {0} began late on {1} due to a temporary failure caused by either a system malfunction or a power loss and stopped ...
  2. Recording of {0} began late on {1} due to a temporary failure caused by either a system malfunction or a power loss and stopped ...
  3. Recording of {0} began late on {1} due to a temporary failure caused by either a system malfunction or a power loss and stopped ...
  4. Recording of {0} began late on {1} due to a temporary failure caused by either a system malfunction or a power loss and was ...
  5. Recording of {0} began late on {1} due to a temporary failure caused by either a system malfunction or a power loss and was ...
  6. Recording of {0} began late on {1} due to a temporary failure caused by either a system malfunction or a power loss and was ...
  7. Recording of {0} began late on {1} due to a temporary failure caused by either a system malfunction or a power loss and was ...
  8. Recording of {0} began late on {1} due to a temporary failure caused by either a system malfunction or a power loss. This ...
  9. Recording of {0} began on {1} while the program was already in progress and stopped early on {2} when a conflicting recording ...
  10. Recording of {0} began on {1} while the program was already in progress and stopped on {2} due to a lack of available disk ...
  11. Recording of {0} began on {1} while the program was already in progress and was interrupted when the computer lost power ...
  12. Recording of {0} began on {1} while the program was already in progress and was interrupted when the machine was powered ...
  13. Recording of {0} began on {1} while the program was already in progress and was stopped due to a lack of audio/video data. ...
  14. Recording of {0} began when requested on {1} while the program was already in progress and was manually stopped on {2} for ...
  15. Recording of {0} began when requested on {1} while the program was already in progress and was stopped because the recording ...
  16. RecordLog serves as an aggregation point for LogRecord objects. This class presents a higher level view of a log than its ...
  17. Records: - Flow: Used = %1!10lu! Returned = %2!10lu! InUse = %3!10lu! SlowFree Queued = %4!10lu! SlowFree Completed = %5!10lu! ...
  18. Recovery console: Allow automatic administrative logon This security setting determines if the password for the Administrator ...
  19. Recovery console: Allow floppy copy and access to all drives and all folders Enabling this security option makes the Recovery ...
  20. Recovery of data protection master key was attempted. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ...
  21. Recovery of data protection master key. Key Identifier: %1 Recovery Reason: %3 Recovery Server: %2 Recovery Key ID: %4 Failure ...
  22. Recovery of the application to the original location is not allowed because the application is not registered with Windows ...
  23. Recreating disks. This step recreates partitions and volumes on disks and fully formats the recreated volumes. This could ...
  24. Recursion: - Query: Queries Recursed = %1!10lu! Original Questions = %2!10lu! Additional Question = %3!10lu! Total Questions ...
  25. Redeploying this application will reinstall the application everywhere it is already installed. Do you want to continue? ...
  26. Redirect files from one directory to another. This shim accepts a list of directories to redirect, a list of directories ...
  27. Redirect messages are sent to indicate that the node which the packet was sent to is no longer the best gateway to reach ...
  28. Redirect registry keys from one branch to another. This shim accepts a list of branches to redirect, a list of branches to ...
  29. Reduces the size of the volume with focus by the specified amount. Makes free disk space available from unused space at the ...
  30. RedundancyStatus provides information on the state of the redundancy group. \"Fully Redundant\" (value=2) means that all ...
  31. Redundant Read} To satisfy a read request, the NT fault-tolerant file system successfully read the requested data from a ...
  32. Redundant Write} To satisfy a write request, the NT fault-tolerant file system successfully wrote a redundant copy of the ...
  33. Reference scope constraint '{0}' has been violated: the uri attribute value '{1}' in element '{2}' is not in the range of ...
  34. Referring to high-resolution patterns Y, X1 - X6, B1 and B2, enter the numbers of the columns in which the deviation of the ...
  35. Referring to high-speed printing mode patterns E, F, G, and H, enter the numbers of the columns in which the black and red ...
  36. Referring to the patterns printed in columns G and H, select the pattern that is smoothest and has no stripes in areas indicated ...
  37. Reflections with suspiciously long delay. If the room is very large, this is normal. Otherwise, calibration results may be ...
  38. Refresh rate in hertz. If a range of rates is supported, use the MinRefreshRate and MaxRefreshRate properties, and set RefreshRate ...
  39. Refresh the library, physical media or all devices of a particular media type. RSM REFRESH /L[G|F | /P[G|F | /TG The /[L|P|T]G ...
  40. Refreshes the properties of the object with with the values stored in the directory service (for public queues) or the local ...
  41. Refreshes the state of all disks in the selected pack, attempts recovery on disks in the invalid pack and resynchronizes ...
  42. Refreshes the state of all disks in the selected pack. Attempts recovery on disks in the invalid pack, and resynchronizes ...
  43. Refreshing connection details automatically on a frequent basis can impact server performance. To maximize server performance, ...
  44. REG ADD KeyName /v ValueName | /ve /t Type /s Separator /d Data /f KeyName \Machine\]FullKey Machine Name of remote machine ...
  45. REG COMPARE KeyName1 KeyName2 /v ValueName | /ve Output /s KeyName \Machine\]FullKey Machine Name of remote machine - omitting ...
  46. REG COPY KeyName1 KeyName2 /s /f KeyName \Machine\]FullKey Machine Name of remote machine - omitting defaults to the current ...
  47. REG DELETE KeyName /v ValueName | /ve | /va /f KeyName \Machine\]FullKey Machine Name of remote machine - omitting defaults ...
  48. REG EXPORT KeyName FileName /y Keyname ROOTKEY[\SubKey (local machine only). ROOTKEY HKLM | HKCU | HKCR | HKU | HKCC SubKey ...
  49. REG FLAGS KeyName QUERY | SET DONT_VIRTUALIZE DONT_SILENT_FAIL RECURSE_FLAG Keyname "HKLM\Software"[\SubKey (Restricted to ...
  50. REG IMPORT FileName FileName The name of the disk file to import (local machine only). Examples: REG IMPORT AppBkUp.reg Imports ...
  51. REG LOAD KeyName FileName KeyName ROOTKEY\SubKey (local machine only) ROOTKEY HKLM | HKU SubKey The key name to load the ...
  52. REG Operation Parameter List Operation QUERY | ADD | DELETE | COPY | SAVE | LOAD | UNLOAD | RESTORE | COMPARE | EXPORT | ...
  53. REG QUERY KeyName /v ValueName | /ve /s /f Data /k /d /c /e /t Type /z /se Separator KeyName \Machine\]FullKey Machine - ...
  54. REG RESTORE KeyName FileName KeyName ROOTKEY\SubKey (local machine only) ROOTKEY HKLM | HKCU | HKCR | HKU | HKCC SubKey The ...
  55. REG SAVE KeyName FileName /y KeyName ROOTKEY\SubKey ROOTKEY HKLM | HKCU | HKCR | HKU | HKCC SubKey The full name of a registry ...
  56. REG UNLOAD KeyName KeyName ROOTKEY\SubKey (local machine only) ROOTKEY HKLM | HKU SubKey The key name of the hive to unload. ...
  57. Register application as a protocol handler. The command line takes a series of 3 values, multiple Clients may be seperated ...
  58. Register online to get tips, tools, online training, and support resources designed to help your business get the most out ...
  59. Register online to get tips, tools, online training, and support resources designed to help your business get the most out ...
  60. Registered type library information is invalid. The library GUID, version, locale, or platform information may be corrupt. ...
  61. Registers and updates IP addresses and DNS records for this computer. If this service is stopped, this computer will not ...
  62. Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported ...
  63. Registration of this component failed. This component resides in a file which lacks self-registration code but for which ...
  64. Registry Editor could not retrieve the security information. The key currently selected does not give you access to retrieve ...
  65. Registry Editor could not save the security information. The key currently selected does not give you access to save such ...
  66. Registry Editor could not set security in all subkeys. The key currently selected contains one or more inaccessible subkeys. ...
  67. Registry Editor could not set security in all subkeys. The key currently selected contains one or more subkeys marked for ...
  68. Registry Editor could not set security in the key currently selected, or some of its subkeys. These keys do not give you ...
  69. Registry File Failure} The registry cannot load the hive (file): %hs or its log or alternate. It is corrupt, absent, or not ...
  70. Registry Hive Recovered} Registry hive (file): %hs was corrupted and it has been recovered. Some data might have been lost. ...
  71. Registry Hive Recovered} Registry hive (file): '%3' was corrupted and it has been recovered. Some data might have been lost. ...
  72. Registry key is under the HKEY_CURRENT_USER hive, Theoretically, if this is false, the class instance should be stored in ...
  73. Registry policy allows an administrator to configure registry settings of any type. This policy differs significantly from ...
  74. Registry Quota In Use is the percentage of the Total Registry Quota Allowed that is currently being used by the system. This ...
  75. Registry Recovery} One of the files containing the system's Registry data had to be recovered by use of a log or alternate ...