Windows Server 2008

  1. s" is currently logged in. Changes to parental controls settings may not take effect until their next logon. Do you want ...
  2. s) will not be able to play content from your library. Do you want to prevent all other users on this computer from sharing ...
  3. SA Rekeys is the number of successful rekey operations for Quick Mode security associations since the computer was last started. ...
  4. Safe browsing and still functional - Prompts before downloading potentially unsafe content - Unsigned ActiveX controls will ...
  5. SAM failed to write changes to the database. This is most likely due to a memory or disk-space shortage. The SAM database ...
  6. Same as Medium without prompts - Most content will be run without prompts - Unsigned ActiveX controls will not be downloaded ...
  7. Satellite speakers usually have a limited dynamic range and require that they be used with a subwoofer. If your configuration ...
  8. Save instructions to a safe location If you can't print, save the instructions to a location other than the failing disk, ...
  9. Save settings to a USB flash drive Choose this to use a USB flash drive to add wireless devices and computers running Windows ...
  10. Saves cookies from any website. - Cookies that are already on this computer can be read by the websites that created them ...
  11. Saves the specified event log to a backup file. The method returns an integer value that can be interpretted as follows: ...
  12. Scales image to the specified Maximum Width and Maximum Height preserving Aspect Ratio if necessary. MaximumWidth - Set the ...
  13. scan has detected spyware or other potentially unwanted software. For more information please see the following: %15 Scan ...
  14. scan has encountered an error and terminated. Scan ID:%b%3 Scan Type:%b%5 Scan Parameters:%b%7 User:%b%8\%9 Error Code:%b%11 ...
  15. Scanning the network to see if all the domain controllers in the target forest are Win2k3 SP1 or higher. This check may take ...
  16. Schedule intervals cannot overlap. Ensure that the intervals for this schedule include start times and end times that do ...
  17. Schedule new storage report jobs. The syntax of this command is: Storrept Reports Add /Task:TASK /Scope:"SCOPE" /Add-Report:TYPE ...
  18. Schedule not found. Configure the scheduled backup by adding a backup location, volumes to back up, and times of day to run ...
  19. Scheduled backup configuration conflicts with group policy settings, error - '%1'. Failing scheduled backup due to the conflict. ...
  20. Scheduled backup configuration conflicts with group policy settings, error - '%1'. Failing scheduled backup due to the conflict. ...
  21. Scheduled backup configuration conflicts with group policy settings, error - '%1'. Failing scheduled backup started at '%2' ...
  22. Scheduled backup configuration conflicts with group policy settings, error - '%2'. Failing scheduled backup started at '%1' ...
  23. Scheduled backup started at '%1' failed because the schedule settings was not found. Please re-configure scheduled backup. ...
  24. Scheduled Task created: File Name: %1 Command: %2 Triggers: %3 Time: %4 %5 Flags: %6 Target User: %7 By: User: %8 Domain: ...
  25. Schema document '{0}' defines namespace '{1}', which is referenced in document '{2}'. A schema document cannot be removed ...
  26. Schema information for this object type is not available because: %1 This may cause object creation to fail. You should quit ...
  27. Schema linked attributes %1 and %2 have different syntaxes. We will be unable to infer the forward link from the backward ...
  28. Schema updates have not yet happened on the local DC. Please retry later. The schema updates usually take at least 5 minutes ...
  29. Schema/schema cache error (%1) occurred. Schema collection ref: %2, content class: %3. This error is internal, for debugging. ...
  30. Scope options are additional configuration parameters that a DHCP server can assign to DHCP clients. For example, some commonly ...
  31. Script signature is invalid or the Directory Service could not verify the script signature. Additional data: Error value: ...
  32. Scripting or execute permissions are enabled on the IIS virtual directory associated with the job. To upload files to the ...
  33. SDDL right Right value - - GA - GENERIC_ALL GR - GENERIC_READ GW - GENERIC_WRITE GX - GENERIC_EXECUTE RC - READ_CONTROL SD ...
  34. SDDL right Right value - - GA - GENERIC_ALL KA - GENERIC_ALL GR - GENERIC_READ GW - GENERIC_WRITE GX - GENERIC_EXECUTE RC ...
  35. Search cannot crawl the item, because its Access Control List exceeded 64 KB. Check that the item has a valid Access Control ...
  36. Search enables you to locate Web service information. You can search for services, service providers, or tModels by name ...
  37. Search for Sites, Domains and OU's that use this Group Policy Object. Click the Find Now button to start the search. This ...
  38. Search was unable to convert the Access Control List of the crawled store into a Windows NT Access Control List. Check that ...
  39. Search your way. Get all the search tools you need in one place. Find images quickly and get detailed maps and directions ...
  40. Searches for a text string in a file or files. FIND /V /C /N /I /OFF[LINE "string" drive:][path]filename[ . /V Displays all ...
  41. Searches for strings in files. FINDSTR /B /E /L /R /S /I /X /V /N /M /O /P /F:file /C:string /G:file /D:dir list /A:color ...
  42. Searching from the selected event to the end of the list, there is no event that contains the specified string. To search ...
  43. SearchToken - Used to select the keys and certificates to be recovered. Can be any of the following: Certificate Common Name ...
  44. Secondary Stats: - NOTIFY: Received = %1!10lu! Invalid = %2!10lu! Primary = %3!10lu! No Version = %4!10lu! New Version = ...
  45. Sections is the number of sections in the computer at the time of data collection. This is an instantaneous count, not an ...
  46. Secure Password (PEAP-MS-CHAP v2). This authentication type permits users to type password-based credentials during authentication. ...
  47. Secure Sockets Layer (SSL) encryption provides a secure channel for communication when publishing information to a UDDI Services ...
  48. Secured the machine account %1. The builtin\account operators full control Access Control Entry was removed from the security ...
  49. Security Accounts Manager initialization failed because of the following error: %1. Error Status: 2. Click OK to shut down ...
  50. Security Accounts Manager initialization failed because of the following error: %1. Error Status: 2. Click OK to shut down ...
  51. Security Accounts Manager initialization failed because of the following error: %1. Error Status: 2. Please click OK to shutdown ...
  52. Security Accounts Manager initialization failed because of the following error: %hs Error Status: x. Please click OK to shutdown ...
  53. Security Accounts Manager initialization failed because of the following error: %hs Error Status: x. Please click OK to shutdown ...
  54. Security Accounts Manager initialization failed because of the following error: %hs Error Status: x. Please shutdown this ...
  55. Security Center can alert you when your computer might be at risk by displaying a notification and by displaying the Security ...
  56. Security Center can't enable User Account Control on this computer because your system administrator is controlling these ...
  57. Security checking on your computer is not working properly. Setup can continue, but will be unable to check security. Do ...
  58. Security Configuration Analysis is an administrative tool to secure a computer and analyze security aspects. You can create ...
  59. Security Configuration and Analysis is an administrative tool used to secure a computer and analyze security aspects. You ...
  60. Security Configuration and Analysis is an MMC snap-in that provides security configuration and analysis for Windows computers ...
  61. Security Configuration and Analysis To Open an Existing Database Right-click the Security Configuration and Analysis scope ...
  62. Security configuration on converted drive %1 failed. Please look at %windir%\security\logs\convert.log for detailed errors. ...
  63. Security Configuration Server (in services.exe) is not ready. This is probably in system reboot. Policy will be tried again ...
  64. Security Disabled Global Group Changed: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: ...
  65. Security Disabled Global Group Created: New Account Name: %1 New Domain: %2 New Account ID: %3 Caller User Name: %4 Caller ...
  66. Security Disabled Global Group Deleted: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: ...
  67. Security Disabled Global Group Member Added: Member Name: %1 Member ID: %2 Target Account Name: %3 Target Domain: %4 Target ...
  68. Security Disabled Global Group Member Removed: Member Name: %1 Member ID: %2 Target Account Name: %3 Target Domain: %4 Target ...
  69. Security Disabled Local Group Changed: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: ...
  70. Security Disabled Local Group Created: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: ...
  71. Security Disabled Local Group Deleted: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: ...
  72. Security Disabled Local Group Member Added: Member Name: %1 Member ID: %2 Target Account Name: %3 Target Domain: %4 Target ...
  73. Security Disabled Local Group Member Removed: Member Name: %1 Member ID: %2 Target Account Name: %3 Target Domain: %4 Target ...
  74. Security Disabled Universal Group Changed: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: ...
  75. Security Disabled Universal Group Created: New Account Name: %1 New Domain: %2 New Account ID: %3 Caller User Name: %4 Caller ...