Windows Server 2008
- Several items from the following location have failed to play: %s Do you want to remove all items in that location from the ...
- Several items from the following location have failed to play: %s Do you want to remove files that cannot be found in that ...
- Several local machine sites (for example, http://localhost, https://localhost, hcp://system) are added to the Local intranet ...
- Severity=Info DHCPV6 Relay Agent has discarded a packet received on the local interface with IP address %1. The packet had ...
- Severity=Warning DHCPV6R has discarded a packet received on the local interface with IP address %1. The packet had a hop-count ...
- Sexual material of any kind, in any context, although this does not include sexual violence, which is described separately ...
- Shadow copies allow users to view the contents of shared folders as the contents existed at previous points in time. For ...
- Shadow Copies of Shared Folders provides point-in-time copies of files that are located on shared resources, such as a file ...
- Shadow copy '%1' was deleted during storage report generation. Volume '%2' might be configured with inadequate shadow copy ...
- Shadow copy automatically creates point-in-time copies of files as you work, so you can quickly and easily retrieve versions ...
- Shadow copy context and options cannot be changed at this point. Use RESET to reset DiskShadow to its original state, or ...
- Shadow copy creation failed for volume '%1' after retrying for %2 minutes because other shadow copies were being created. ...
- Shadow copy creation failed for volume '%1' with error %2. The volume might be configured with inadequate shadow copy storage ...
- Shadow Copy ID: %1 Original Volume: (%2)%3 Shadow Copy Volume: %4 Originating Machine: %5 Service Machine: %6 Provider: '%7' ...
- Shadow Copy Storage association For volume: (%1)%2 Shadow Copy Storage volume: (%3)%4 Used Shadow Copy Storage space: %5 ...
- Share name that you entered may not be accessible from some MS-DOS workstations. Are you sure you want to use this share ...
- Share permissions provide a level of access control for a shared folder. NTFS permissions control local access to files and ...
- Share permissions provide a level of access control for a shared folder. NTFS permissions control local access to files and ...
- Shared data cannot be updated because selection data was not updated on selection change. The snap-in might not be calling ...
- ShareName%" is available but the user account that you are logged on with was denied access Windows cannot further diagnose ...
- ShareName%" is available but the user account that you are logged on with was denied access Windows cannot further diagnose ...
- Sharing is authorized because your firewall has been turned off. If you are concerned about privacy on this network, turn ...
- Shim which intercepts the ShowWindow API call and fixes the problem due to tabbed browsing architecture changes in IE. The ...
- Shortcuts policy allows an administrator to manage shortcuts of any type that can be configured manually on a computer, including ...
- should be in the following forms: group@domain or domain\group user@domain or domain\user FQDN of the user or group A string ...
- Should the public and private key pair, and the certificate be exported to a password protected PFX file and the private ...
- ShowCursor will display the cursor if the count is >= 0, this shim will force ShowCursor to act as a toggle rather than a ...
- SHOWISM can very useful for locating improperly configured sites. This operation cannot be executed remotely. As the KCC ...
- Shuffling refreshes the music on your device by replacing the existing music files with new ones. Do you want to continue? ...
- Shut down the system This security setting determines which users who are logged on locally to the computer can shut down ...
- Shutdown: Allow system to be shut down without having to log on This security setting determines whether a computer can be ...
- Shutdown: Clear virtual memory pagefile This security setting determines whether the virtual memory pagefile is cleared when ...
- SHV configuration: - Id = %1!d! Name = %2!s! Vendor = %3!s! Description = %4!s! Version = %5!s! Policy server unreachable ...
- SID filtering is enabled for this trust. Only SIDs from the trusted domain will be accepted for authorization data returned ...
- SID filtering is not enabled for this trust. All SIDs presented in an authentication request from this domain will be honored. ...
- SID History was added to an account. Subject: Security ID: %6 Account Name: %7 Account Domain: %8 Logon ID: %9 Target Account: ...
- Sidebar experienced a problem with one of the gadgets in the list below. Try to find the gadget that you think caused the ...
- SIDs were filtered. Target Account: Security ID: %1 Account Name: %2 Account Domain: %3 Trust Information: Trust Direction: ...
- Signature (SIG) Cryptographic signature (SIG) record. Authenticates a resource record set of a particular type, class, and ...
- Signature validation cannot be performed on modules loaded by COM, so the object will not be created. The object is likely ...
- signature version has been updated. Current Signature Version:%b%3 Previous Signature Version:%b%4 Update Source:%b%6 Signature ...
- Signing Certificate is automatically updated by OCSP Responder Service. CA Configuration ID: %1 New Signing Certificate Hash: ...
- Signing Certificate was automatically updated by the OCSP Responder Service. CA Configuration ID: %1 New Signing Certificate ...
- Similar to the way that logical devices are 'Realized' by physical elements, unitary computer systems are realized in one ...
- Simple Network Management Protocol (SNMP) includes agents that monitor the activity in network devices and report to the ...
- Simple Network Management Protocol (SNMP) Service includes agents that monitor the activity in network devices and report ...
- Simple TCP/IP Services supports the following TCP/IP services: Character Generator, Daytime, Discard, Echo and Quote of the ...
- Simulating a failure could cause the application or service to be moved to another node in the cluster and this could interrupt ...
- Since an MSMQ 1.0 primary site controller owns the queue, you must manually delete the queue from the MSMQ 1.0 site (use ...
- Since software elements in a ready to run state cannot transition into another state, the value of the phase property is ...
- Since these permissions propagate to all child objects, making this change will require more storage and time to evaluate. ...
- Since this account partner is configured to use a Windows trust relationship, the UPN claim mapping must be enabled. Enable ...
- Since you have specified the RPC/HTTP proxy echo only option (-E), the endpoint/interface you have specified will be ignored ...
- Since your system administrator requires a log to be maintained of all Remote Assistance sessions, Remote Assistance will ...
- Single Instance Storage (SIS) enables you to reduce the amount of storage space used by consolidating duplicate files into ...
- Single Instance Store (SIS) consolidates any files residing on a volume that have identical content into a single primary ...
- Single sign-on is an authentication method that eliminates the need for users to enter credentials every time they initiate ...
- Site %1 has been created. To finish configuration of %1: Ensure that %1 is linked to other sites with site links as appropriate. ...
- Site '%2' does not have any Domain Controllers for domain '%3'. Domain Controllers in site '%1' have been automatically selected ...
- Site '%2' does not have any Global Catalog servers for forest '%3'. Global Catalog servers in site '%1' have been automatically ...
- Site '%2' does not have any LDAP servers for non-domain NC '%3'. LDAP servers in site '%1' have been automatically selected ...
- Site '%2' is no longer manually configured in the registry as covered by this Domain Controller for domain '%3'. As a result, ...
- Site '%2' is no longer manually configured in the registry as covered by this Global Catalog server for forest '%3'. As a ...
- Site '%2' is no longer manually configured in the registry as covered by this LDAP server for non-domain NC '%3'. As a result, ...
- Site Server 3.0 has a known compatibility issue with this version of Windows. For an update that is compatible with this ...
- SiteName from IP - %1!s! of %2!s! in DC - %3!s! is %4!s! while in ADSite it is %5!s!, this can lead to different referral ...
- Sites are boundaries for intrasite replication. They provide a way to define which domain controller is used for authentication ...
- Size in bytes of the blocks which form this StorageExtent. If variable block size, then the maximum block size in bytes should ...
- Size of Files Received shows the uncompressed size (in bytes) of the files received for this replicated folder. This is the ...
- Size of Files Received shows the uncompressed size (in bytes) of the files received on this connection. This is the number ...
- Skip instructions Printing or saving the instructions is strongly recommended. However, if you can't print or save now, you ...
- Skip router configuration If you choose this option, you won't have a working Internet connection. You can still set up your ...
- Skipping ping from network interface {2} IP Address {3} to network interface {0} IP Address {1} because the ICMP packet will ...
- SlotLayout is a free-form string that describes the slot positioning, typical usage, restrictions, individual slot spacings ...
- Slots are special types of connectors into which adapter cards are inserted. This relationship of a card in a slot is made ...