Windows Server 2008

  1. Several items from the following location have failed to play: %s Do you want to remove all items in that location from the ...
  2. Several items from the following location have failed to play: %s Do you want to remove files that cannot be found in that ...
  3. Several local machine sites (for example, http://localhost, https://localhost, hcp://system) are added to the Local intranet ...
  4. Severity=Info DHCPV6 Relay Agent has discarded a packet received on the local interface with IP address %1. The packet had ...
  5. Severity=Warning DHCPV6R has discarded a packet received on the local interface with IP address %1. The packet had a hop-count ...
  6. Sexual material of any kind, in any context, although this does not include sexual violence, which is described separately ...
  7. Shadow copies allow users to view the contents of shared folders as the contents existed at previous points in time. For ...
  8. Shadow Copies of Shared Folders provides point-in-time copies of files that are located on shared resources, such as a file ...
  9. Shadow copy '%1' was deleted during storage report generation. Volume '%2' might be configured with inadequate shadow copy ...
  10. Shadow copy automatically creates point-in-time copies of files as you work, so you can quickly and easily retrieve versions ...
  11. Shadow copy context and options cannot be changed at this point. Use RESET to reset DiskShadow to its original state, or ...
  12. Shadow copy creation failed for volume '%1' after retrying for %2 minutes because other shadow copies were being created. ...
  13. Shadow copy creation failed for volume '%1' with error %2. The volume might be configured with inadequate shadow copy storage ...
  14. Shadow Copy ID: %1 Original Volume: (%2)%3 Shadow Copy Volume: %4 Originating Machine: %5 Service Machine: %6 Provider: '%7' ...
  15. Shadow Copy Storage association For volume: (%1)%2 Shadow Copy Storage volume: (%3)%4 Used Shadow Copy Storage space: %5 ...
  16. Share name that you entered may not be accessible from some MS-DOS workstations. Are you sure you want to use this share ...
  17. Share permissions provide a level of access control for a shared folder. NTFS permissions control local access to files and ...
  18. Share permissions provide a level of access control for a shared folder. NTFS permissions control local access to files and ...
  19. Shared data cannot be updated because selection data was not updated on selection change. The snap-in might not be calling ...
  20. ShareName%" is available but the user account that you are logged on with was denied access Windows cannot further diagnose ...
  21. ShareName%" is available but the user account that you are logged on with was denied access Windows cannot further diagnose ...
  22. Sharing is authorized because your firewall has been turned off. If you are concerned about privacy on this network, turn ...
  23. Shim which intercepts the ShowWindow API call and fixes the problem due to tabbed browsing architecture changes in IE. The ...
  24. Shortcuts policy allows an administrator to manage shortcuts of any type that can be configured manually on a computer, including ...
  25. should be in the following forms: group@domain or domain\group user@domain or domain\user FQDN of the user or group A string ...
  26. Should the public and private key pair, and the certificate be exported to a password protected PFX file and the private ...
  27. ShowCursor will display the cursor if the count is >= 0, this shim will force ShowCursor to act as a toggle rather than a ...
  28. SHOWISM can very useful for locating improperly configured sites. This operation cannot be executed remotely. As the KCC ...
  29. Shuffling refreshes the music on your device by replacing the existing music files with new ones. Do you want to continue? ...
  30. Shut down the system This security setting determines which users who are logged on locally to the computer can shut down ...
  31. Shutdown: Allow system to be shut down without having to log on This security setting determines whether a computer can be ...
  32. Shutdown: Clear virtual memory pagefile This security setting determines whether the virtual memory pagefile is cleared when ...
  33. SHV configuration: - Id = %1!d! Name = %2!s! Vendor = %3!s! Description = %4!s! Version = %5!s! Policy server unreachable ...
  34. SID filtering is enabled for this trust. Only SIDs from the trusted domain will be accepted for authorization data returned ...
  35. SID filtering is not enabled for this trust. All SIDs presented in an authentication request from this domain will be honored. ...
  36. SID History was added to an account. Subject: Security ID: %6 Account Name: %7 Account Domain: %8 Logon ID: %9 Target Account: ...
  37. Sidebar experienced a problem with one of the gadgets in the list below. Try to find the gadget that you think caused the ...
  38. SIDs were filtered. Target Account: Security ID: %1 Account Name: %2 Account Domain: %3 Trust Information: Trust Direction: ...
  39. Signature (SIG) Cryptographic signature (SIG) record. Authenticates a resource record set of a particular type, class, and ...
  40. Signature validation cannot be performed on modules loaded by COM, so the object will not be created. The object is likely ...
  41. signature version has been updated. Current Signature Version:%b%3 Previous Signature Version:%b%4 Update Source:%b%6 Signature ...
  42. Signing Certificate is automatically updated by OCSP Responder Service. CA Configuration ID: %1 New Signing Certificate Hash: ...
  43. Signing Certificate was automatically updated by the OCSP Responder Service. CA Configuration ID: %1 New Signing Certificate ...
  44. Similar to the way that logical devices are 'Realized' by physical elements, unitary computer systems are realized in one ...
  45. Simple Network Management Protocol (SNMP) includes agents that monitor the activity in network devices and report to the ...
  46. Simple Network Management Protocol (SNMP) Service includes agents that monitor the activity in network devices and report ...
  47. Simple TCP/IP Services supports the following TCP/IP services: Character Generator, Daytime, Discard, Echo and Quote of the ...
  48. Simulating a failure could cause the application or service to be moved to another node in the cluster and this could interrupt ...
  49. Since an MSMQ 1.0 primary site controller owns the queue, you must manually delete the queue from the MSMQ 1.0 site (use ...
  50. Since software elements in a ready to run state cannot transition into another state, the value of the phase property is ...
  51. Since these permissions propagate to all child objects, making this change will require more storage and time to evaluate. ...
  52. Since this account partner is configured to use a Windows trust relationship, the UPN claim mapping must be enabled. Enable ...
  53. Since you have specified the RPC/HTTP proxy echo only option (-E), the endpoint/interface you have specified will be ignored ...
  54. Since your system administrator requires a log to be maintained of all Remote Assistance sessions, Remote Assistance will ...
  55. Single Instance Storage (SIS) enables you to reduce the amount of storage space used by consolidating duplicate files into ...
  56. Single Instance Store (SIS) consolidates any files residing on a volume that have identical content into a single primary ...
  57. Single sign-on is an authentication method that eliminates the need for users to enter credentials every time they initiate ...
  58. Site %1 has been created. To finish configuration of %1: Ensure that %1 is linked to other sites with site links as appropriate. ...
  59. Site '%2' does not have any Domain Controllers for domain '%3'. Domain Controllers in site '%1' have been automatically selected ...
  60. Site '%2' does not have any Global Catalog servers for forest '%3'. Global Catalog servers in site '%1' have been automatically ...
  61. Site '%2' does not have any LDAP servers for non-domain NC '%3'. LDAP servers in site '%1' have been automatically selected ...
  62. Site '%2' is no longer manually configured in the registry as covered by this Domain Controller for domain '%3'. As a result, ...
  63. Site '%2' is no longer manually configured in the registry as covered by this Global Catalog server for forest '%3'. As a ...
  64. Site '%2' is no longer manually configured in the registry as covered by this LDAP server for non-domain NC '%3'. As a result, ...
  65. Site Server 3.0 has a known compatibility issue with this version of Windows. For an update that is compatible with this ...
  66. SiteName from IP - %1!s! of %2!s! in DC - %3!s! is %4!s! while in ADSite it is %5!s!, this can lead to different referral ...
  67. Sites are boundaries for intrasite replication. They provide a way to define which domain controller is used for authentication ...
  68. Size in bytes of the blocks which form this StorageExtent. If variable block size, then the maximum block size in bytes should ...
  69. Size of Files Received shows the uncompressed size (in bytes) of the files received for this replicated folder. This is the ...
  70. Size of Files Received shows the uncompressed size (in bytes) of the files received on this connection. This is the number ...
  71. Skip instructions Printing or saving the instructions is strongly recommended. However, if you can't print or save now, you ...
  72. Skip router configuration If you choose this option, you won't have a working Internet connection. You can still set up your ...
  73. Skipping ping from network interface {2} IP Address {3} to network interface {0} IP Address {1} because the ICMP packet will ...
  74. SlotLayout is a free-form string that describes the slot positioning, typical usage, restrictions, individual slot spacings ...
  75. Slots are special types of connectors into which adapter cards are inserted. This relationship of a card in a slot is made ...