Windows Server 2003

  1. The EnableDaylightSavingsTime property indicates whether Daylight Savings Time is recognized on this machine. FALSE - time ...
  2. The EnableDevQueryPrint property indicates whether to hold documents in the queue, if document and printer setups do not ...
  3. The EnableDHCP method enables the Dynamic Host Configuration Protocol (DHCP) for service with this network adapter. DHCP ...
  4. The EnableDNS method enables the Domain Name System (DNS) for service on this TCP/IP-bound network adapter. The method returns ...
  5. The EnableEvents property indicates whether the WMI event subsystem should be enabled. Values: TRUE or FALSE, If TRUE,then ...
  6. The EnableIPFilterSec method is used to enable IP security globally across all IP-bound network adapters. With security enabled, ...
  7. The EnableIPSec method is used to enable IP security on this specific TCP/IP-enabled network adapter. Ports are secured only ...
  8. The EnableStartupHeapPreallocation property indicates whether WMI will start with a pre-allocated heap. Values: TRUE or FALSE. ...
  9. The EnableStatic method enables static TCP/IP addressing for the target network adapter. As a result, DHCP for this network ...
  10. The EnableWINS method enables Windows Internet Naming Service (WINS) settings specific to TCP/IP, but independent of the ...
  11. The encoded length of your request is 7F. Some old programs cannot handle certificates of this size, so Certificate Services ...
  12. The EncryptionLevel property specifies if the encryption level for secure transactions is 40-bit, 128-bit, or n-bit encryption. ...
  13. The EncryptionMethod property is a free form string indicating the algorithm or tool used to encrypt the logical file. If ...
  14. The ending address is not valid for this range. Subnet broadcast addresses (host ID of all 1s) are not valid ending addresses. ...
  15. The ending address specified for the address range is invalid. Please enter an ending address that is greater than or equal ...
  16. The ending address, referenced by an application or operating system and mapped by a memory controller, for this memory object. ...
  17. The EndingAddress property specifies the ending address referenced by an application or operating system. This memory address ...
  18. The enhanced security configuration also adjusts the Internet Explorer extensibility and security settings to further reduce ...
  19. The enhanced security configuration also restricts access to scripts, executable files, and other potentially unsafe files ...
  20. The enhanced security configuration applies to different user accounts according to the type of installation. The following ...
  21. The enhanced security configuration increases the level of security on your server, but may also affect Internet browsing ...
  22. The Enrollee (%1) has no E-Mail name registered in the Active Directory. The E-Mail name will not be included in the certificate. ...
  23. The entire migration process has completed successfully. All the objects in the MQIS database were migrated to Active Directory. ...
  24. The entries in this list must match the entries specified in Phone Book Administrator. If this list already contains your ...
  25. The EnvironmentVariables property contains a list of settings for the configuration of a computer. Environment variables ...
  26. The EqualPerUser and EqualPerProcess management rules cannot be applied to an allocation which is sub-allocated. Specify ...
  27. The error object (if one) resulting from a failed creation of a target instance. This error object is created by the provider ...
  28. The ErrorAccess property indicates the memory access operation that caused the last error. This property is valid only when ...
  29. The ErrorAddress property specifies the address of the last memory error. This property is used only when ErrorInfo is not ...
  30. The ErrorControlForced property contains the command string used to enable error correction control when establishing a connection. ...
  31. The ErrorData property contains data captured from the last memory access with an error. The data occupies the first n octets ...
  32. The ErrorDataOrder property indicates the ordering for data stored in the ErrorData property. This property is used only ...
  33. The ErrorInfo property contains an integer enumeration describing the type of error that occurred most recently. The values, ...
  34. The ErrorMode property controls how the operating system handles several types of serious errors. You can specify that the ...
  35. The ErrorReplaceCharacter property specifies the value of the character used to replace bytes received with a parity error. ...
  36. The ErrorReplacementEnabled specifies whether bytes received with parity errors are replaced with the ErrorReplaceCharacter ...
  37. The ErrorResolution property specifies the amount of data actually determined to cause the error. This property is unused ...
  38. The ErrorTime property contains the time that the last memory error occurred. This property is valid only when ErrorInfo ...
  39. The ErrorTransferSize property specifies the size of the data (containing the last error) being transferred. This property ...
  40. The EULA also describes the limited warranty, and the terms under which you may make a backup or archival copy of Windows ...
  41. The EULA is the contract that outlines your legal use of the licensed product, and it grants you a specific right to use ...
  42. The evaluation period for this copy of Windows has ended. Windows cannot start. To continue using this version of Windows, ...
  43. The evaluation period for this copy of Windows has ended. Windows cannot start. To continue using Windows, please purchase ...
  44. The event identifier specifies the message that goes with this event as an entry in the message file associated with the ...
  45. The event log time could not be converted from UCT to local time. GetTimeZoneInformation returned a value of %1. UCT time ...
  46. The event message as it appears in the NT Eventlog. This is a standard message with zero or more insertion strings supplied ...
  47. The event-to-trap settings are locked. This usually happens when another application either terminated unexpectedly or it ...
  48. The EventCharacter specifies the value of the control character that is used to signal an event, such as end of file. Example: ...
  49. The EventSystem sub system is suppressing duplicate event log entries for a duration of %1 seconds. The suppression timeout ...
  50. The Examples and Demos Help option is designed only for %OriginalOsName%, not for %TargetOsName%. After the upgrade, Examples ...
  51. The ExceedNotification property indicates whether or not events will be written to the event log when quotas are exceeded. ...
  52. The Exchange 2003 front-end server receives SMTP mail either to act as a gateway, or as a virus scanner, or to allow POP3 ...
  53. The Exchange server downloads e-mail from POP3 (Post Office Protocol 3) mailbox accounts, then redirects that e-mail to specific ...
  54. The Exchange server functions as a dedicated front-end server relaying HTTP, POP3, IMAP4 or NNTP requests to Exchange back-end ...
  55. The exclusion %1!s! is not in the network %2!s!/%3!s! which is the scope defined for the DHCP allocator. Please change the ...
  56. The execution of the setup program for application %1 from policy %2 failed. The setup path was %3 and the error was : %4 ...
  57. The existence of the source domain Sid column in the protar.mdb database's Migrated Objects table could not be verified due ...
  58. The existing domain will not have mail stored properly. You will have to copy the domain directories into the new root mail ...
  59. The existing domain(s) will not have mail stored properly. You will have to copy the domain directories into the new root ...
  60. The ExitCode property specifies a Win32 error code defining any problems encountered in starting or stopping the service. ...
  61. The ExpandedMiniDumpDirectory property is an expanded version of the MiniDumpDirectory property. Example: C:\WinNT\MiniDump ...
  62. The ExpectedBatteryLife property indicates the amount of time it takes to completely drain the battery after it has been ...
  63. The expiration date for installing this program is %s. You have chosen a date that occurs after the expiration date. Please ...
  64. The expiration date has been reached on this version of Network Monitor. If the support situation has not been resolved, ...
  65. The expiration date on this product will be reached within 10 days. If the support situation has not been resolved, please ...
  66. The ExposedLocally property indicates whether the shadow copy is exposed on the local machine with a drive letter or mount ...
  67. The ExposedName property is the file system name of the shadow copy when it is exposed. This property might contain a drive ...
  68. The ExposedPath property is the file system path of the shadow copy when it is exposed. This property is NULL when the shadow ...
  69. The ExposedRemotely property indicates whether the shadow copy is exposed on a remote machine with a network share. If this ...
  70. The Express setup option simplifies the setup of a new network by installing and configuring a common set of server components. ...
  71. The extended functionality in the IBM Aptiva Keyboard was designed for Windows 95. Contact IBM for replacement software that ...
  72. The ExtendedDetectedErrorState property reports standard error information. Any additional information should be recorded ...
  73. The Extensible Authentication Protocol (EAP) extends the authentication methods available for Point-to-Point Protocol (PPP) ...
  74. The extension '%1!ls!' is already associated with file type '%2!ls!'. Do you want to associate it with file type '%3!ls!' ...
  75. The ExtensionInfoAction manages the registration of extension related information with the system. The action registers the ...