Windows 10
- Profiles store information about how to recognize your voice. Change a profile to recognize a different voice or a different ...
- Program %1 with instanceID=%2 was removed from the Security Center reporting database because the program was either uninstalled, ...
- Program that stopped working: %ws Repair status: Success - Restart required Damaged file: %ws Type: %ws Version: %ws Created ...
- Program(s) or devices(s) requesting attention. Message title: %s Program path: %s Received: %s This problem occurs when a ...
- Programs and drivers that might be restored. These programs might not work correctly after restore and might need to be reinstalled: ...
- Programs on the remote computer will continue to run after you have disconnected. You can reconnect to this remote session ...
- Programs sometimes store temporary information in a TEMP folder. Before a program closes, it usually deletes this information. ...
- Programs that might affect your privacy or make changes to your computer that could negatively impact your computing experience, ...
- Programs that might collect your personal information and negatively affect your privacy or damage your computer, for example, ...
- Progress to '%1': %2 stage; %3 retries; %4 bytes sent; %5 total bytes to send; %6 bytes received; %7 total bytes to receive. ...
- Prohibits use of Internet Connection Firewall on your DNS domain network. Determines whether users can enable the Internet ...
- Promotion of the local domain controller to a global catalog has been delayed because the directory partition occupancy requirements ...
- Promotion of this domain controller to a global catalog will be delayed for the following interval. Interval (minutes): %1 ...
- Prompts users for alternate logon credentials during network-based installations. This setting displays the "Install Program ...
- Propagation stopped because the propagation state for search server cannot be read. Try propagation again. If this error ...
- Properties for this program cannot be verified. Another program may be using the APPS.INF file. Close your other programs ...
- Properties for this program cannot be verified. The APPS.INF file is missing. Copy the APPS.INF file from your Windows Setup ...
- Property Store is not found in the indexer. The possible causes are that the call came during a catalog reset or that the ...
- Property {0} of PowerShell class {1} is not declared as array type, but defined in its configuration instance as instance ...
- PropertyName is a string property and is either DeleteTempFolders or UseTempFolders.They are flags that are either set to ...
- PropertyName is an enumeration of the properties: 0 = LPTPortMapping, 1 = COMPortMapping, 2 = AudioMapping, 3 = ClipboardMapping, ...
- PropertyName is an enumeration of the properties: 0 = SessionDirectoryLocation and 1 = SessionDirectoryClusterNamewhich are ...
- Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy. Subject: ...
- Protect data from modification and preserve confidentiality on the network with these integrity and encryption algorithms. ...
- Protect Key operation failed. Cryptographic Parameters: Protector Name: %1 Protector Attributes: %2 Flags: %3 Failure Information: ...
- Protected content was recently transferred to this computer. Type the password for your user account on the old computer ...
- Protected Mode Internet Explorer Shim - intercepts and elevates CreateProcess, WinExec, CoCreateInstance, CoGetClassObject. ...
- Protected Mode Internet Explorer Shim - intercepts save-to-file dialogs and prompts the user with an appropriate location. ...
- Protected Mode Internet Explorer Shim - intercepts save-to-file dialogs and prompts the user with the redirected low location. ...
- Protected Storage helps safeguard data you want to keep private. These details show which program is attempting to access ...
- Protection has not been enabled on the volume. Enabling protection requires a connected account. If you already have a connected ...
- Protection is enabled on the volume but has been suspended. This is likely to have happened due to an update being applied ...
- Protection of auditable protected data was attempted. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ...
- Protection of auditable protected data. Data Description: %2 Key Identifier: %1 Protected Data Flags: %3 Protection Algorithms: ...
- Provide a hint to help you remember your password. Set the hint so that others cannot use it to easily guess your password. ...
- Provide a PIN that contains characters limited to unaccented letters (A-Z, a-z), numbers (0-9), space, and the following ...
- Provide an encryption certificate to be used by Protected Event Logging. You may provide either: - The content of a base-64 ...
- Provide new credentials for "%ws" Open the Save/Replace credentials dialog box to replace the existing credentials or delete ...
- Provide the user name and password to use for scheduling the backup. The user account must have write permission to the remote ...
- Provided payload does not match with the template that was defined for event id {0}. The defined template is following: {1} ...
- Provider returned incorrect type for property, ignoring (custom property may have been registered with different types on ...
- provider`p`provider flags level]`A single Event Trace provider to enable. The terms 'Flags' and 'Keywords' are synonymous ...
- Provides a common interface and object model to access management information about operating system, devices, applications ...
- Provides a mechanism to exchange data between the virtual machine and the operating system running on the physical computer. ...
- Provides a mechanism to shut down the operating system of this virtual machine from the management interfaces on the physical ...
- Provides a network service that processes requests to simulate application of Group Policy settings for a target user or ...
- Provides a platform for communication between the virtual machine and the operating system running on the physical computer. ...
- Provides a space for you to type a server name or a domain name. You can use wildcards in the domain name. Some examples ...
- Provides a way to add comments to a script. Syntax: REM Example: In this example script, REM is used to provide a comment ...
- Provides apps access to structured user data, including contact info, calendars, messages, and other content. If you stop ...
- Provides file system-specific information about an item in the Offline Files cache. This information is available only for ...
- Provides for setting a more granular set of auditing permissions to the existing account specified.The permissions are set ...
- Provides identity services for the Peer Name Resolution Protocol (PNRP) and Peer-to-Peer Grouping services. If disabled, ...
- Provides infrastructure support for deploying Store applications. This service is started on demand and if disabled Store ...
- Provides infrastructure support for the Microsoft Store. This service is started on demand and if disabled applications bought ...
- Provides infrastructure support for the Windows Store. This service is started on demand and if disabled then content acquired ...
- Provides infrastructure support for Windows Store.This service is started on demand and if disabled applications bought using ...
- Provides local station and session host interfaces, and discovers other servers on the network that are running MultiPoint ...
- Provides management services for disks, volumes, file systems, and, hardware array objects such as subsystems, luns, controllers, ...
- Provides network address translation, addressing, name resolution and/or intrusion prevention services for a home or small ...
- Provides no integrity protection for the packet payload or IP header. Use this option only to support network devices and ...
- Provides performance library information from Windows Management Instrumentation (WMI) providers to clients on the network. ...
- Provides process isolation for cryptographic keys used to authenticate to a user's associated identity providers. If this ...
- Provides support for the NetBIOS over TCP/IP (NetBT) service and NetBIOS name resolution for clients on the network, therefore ...
- Provides support for the Secure Socket Tunneling Protocol (SSTP) to connect to remote computers using VPN. If this service ...
- Provides Telephony API (TAPI) support for programs that control telephony devices on the local computer and, through the ...
- Provides the ability to debug the application prelaunch of a specific application by triggering the prelaunch to occur and ...
- Provides the capability to disable any combination of the following: 1. Application Launch Prefetching 2. Operation API Prefetching ...
- Provides the capability to enable any combination of the following: 1. Application Launch Prefetching 2. Operation API Prefetching ...
- Provides the core file encryption technology used to store encrypted files on NTFS file system volumes. If this service is ...
- Provides three management services: Catalog Database Service, which confirms the signatures of Windows files and allows new ...
- Provides tunnel connectivity using IPv6 transition technologies (6to4, ISATAP, Port Proxy, and Teredo), and IP-HTTPS. If ...
- Provides User Account Control validation for the installation of ActiveX controls from the Internet and enables management ...
- Providing 'Deny delete' and 'Deny delete subtree' permissions to protect computer object %1 from accidental deletion failed. ...
- Providing samples of your handwriting increases the likelihood of your writing being recognized correctly. For best results, ...