Windows 8

  1. Note: The recovery operation will cause all replicated content (replicated using DFSR or FRS) on the local computer to resynchronize ...
  2. Note: This check might take a while, but is recommended to ensure that your selected unlock method works without requiring ...
  3. NOTE: This command did not create any new key protectors. Type "manage-bde -protectors -add -?" for information on adding ...
  4. Note: This component only reports overall status information. It does not report information about its individual policy ...
  5. NOTE: This dummy error message is necessary to force MC to output the above defines inside the FACILITY_WINDOWS guard instead ...
  6. Note: This information is intended for a network administrator. If you are not your network's administrator, notify the administrator ...
  7. Note: This information is intended for a network administrator. If you are not your network's administrator, notify the administrator ...
  8. Note: This item has been created by another program. Please use the program to view or edit details related to this item. ...
  9. Note: This recovery option will cause all replicated content on the local server to re-synchronize after recovery. This may ...
  10. Note: This registry setting is not stored in a policy key and thus is considered a preference. Therefore, if the Group Policy ...
  11. Note: This registry setting is not stored in a policy key and thus it is considered a preference. Therefore, if the Group ...
  12. NOTE: This will create an LCE implemented event class. If you wish to install your component implementation, hit the back ...
  13. NOTE: This will create an LCE implemented event class. If you wish to install your component implementation, hit the back ...
  14. Note: To complete the restoration of the cluster associated with this node you must do the following: 1. Start the Cluster ...
  15. Note: To exclude a word from dictation, return to the Speech Dictionary main page and click "Prevent a word from being dictated". ...
  16. Note: To make this Analytic, Debug or Classic event log easier to navigate and manipulate, first save it in .evtx format ...
  17. Note: To protect against computer viruses, e-mail programs may prevent receiving certain types of file attachments. Check ...
  18. Note: To protect against computer viruses, e-mail programs may prevent sending or receiving certain types of file attachments. ...
  19. Note: Try not to use your computer until you have repaired or replaced the hard disk. If you change any documents, they won't ...
  20. Note: Verify that there is no overlap between this range and IP addresses being used by other multicast servers on your network. ...
  21. Note: We recommend that you take the Speech Recognition tutorial first. In addition to improving the recognition of your ...
  22. Note: Windows Update might update itself automatically first when checking for other updates. Read our privacy statement ...
  23. Note: You have only removed the request from the list of pending requests stored in your web browser. This does not affect ...
  24. Note: You should now add records to the zone or ensure that records are updated dynamically. You can then verify name resolution ...
  25. Nothing can be read from or written to the Windows registry. Message Queuing may not be properly installed. Please reinstall ...
  26. Notice that the computer made a mistake. It recognized "Tosh missed an" instead of "Tosh Meston". The computer doesn't know ...
  27. NOTICE: Single notification receipts for multiple recipient transmissions cannot include cover pages as attachments, and ...
  28. Notification API call for %1 AppUserModelId failed. If you are logged into multiple sessions as the same user, please logoff ...
  29. Notification of policy change from LSA/SAM was processed without verifying PDC. Older security policy from this machine may ...
  30. Notifications for the scope %2 are not active. The event logging threshold for this scope was exceeded. No further events ...
  31. Notifications for the scope %2 were reactivated. The event logging threshold for this scope was exceeded. No further events ...
  32. Now that you have configured the server, you will need to add images. These images include a boot image (which is the bootable ...
  33. NPIV virtual port operation for virtual port (%3) on physical port (%4) failed with an error: (%5) and NPIV error: (%6). ...
  34. NPIV virtual port operation on virtual port (%3) failed with an error: Exceeded the maximum number of virtual ports on the ...
  35. NPIV virtual port operation on virtual port (%3) failed with an error: Exceeded the maximum number of virtual ports on the ...
  36. NPIV virtual port operation on virtual port (%3) failed with an error: The DH-CHAP authentication for the virtual port failed(Virtual ...
  37. NPIV virtual port operation on virtual port (%3) failed with an error: The DH-CHAP authentication for the virtual port failed. ...
  38. NPIV virtual port operation on virtual port (%3) failed with an error: The DH-CHAP authentication mechanism is not usable ...
  39. NPIV virtual port operation on virtual port (%3) failed with an error: The DH-CHAP authentication mechanism is not usable. ...
  40. NPIV virtual port operation on virtual port (%3) failed with an error: The DH-CHAP authentication transaction has already ...
  41. NPIV virtual port operation on virtual port (%3) failed with an error: The DH-CHAP authentication transaction has already ...
  42. NPIV virtual port operation on virtual port (%3) failed with an error: The DH-CHAP hash function is not usable (Virtual machine ...
  43. NPIV virtual port operation on virtual port (%3) failed with an error: The fibre channel link is down. (Virtual machine ID ...
  44. NPIV virtual port operation on virtual port (%3) failed with an error: The fibre channel miniport driver does not support ...
  45. NPIV virtual port operation on virtual port (%3) failed with an error: The fibre channel miniport driver does not support ...
  46. NPIV virtual port operation on virtual port (%3) failed with an error: The fibre channel physical port on which the virtual ...
  47. NPIV virtual port operation on virtual port (%3) failed with an error: The fibre channel physical port on which the virtual ...
  48. NPIV virtual port operation on virtual port (%3) failed with an error: The NPIV protocol version is not supported(Virtual ...
  49. NPIV virtual port operation on virtual port (%3) failed with an error: The NPIV WMI operation failed with an unknown error ...
  50. NPIV virtual port operation on virtual port (%3) failed with an error: The NPIV WMI operation failed with an unknown error. ...
  51. NPIV virtual port operation on virtual port (%3) failed with an error: The operation is not supported by the fabric. (Virtual ...
  52. NPIV virtual port operation on virtual port (%3) failed with an error: The operation is not supported by the host. (Virtual ...
  53. NPIV virtual port operation on virtual port (%3) failed with an error: The pre-determined timeout period for the virtual ...
  54. NPIV virtual port operation on virtual port (%3) failed with an error: The pre-determined timeout period for the virtual ...
  55. NPIV virtual port operation on virtual port (%3) failed with an error: The world wide port name already exists on the fabric. ...
  56. NPIV virtual port operation on virtual port (%3) failed with an error: The world wide port name already exists on the fabric. ...
  57. NPS applies settings to the connection request if all of the connection request policy conditions for the policy are matched. ...
  58. NPS applies settings to the connection request if all of the network policy conditions and constraints for the policy are ...
  59. NPS can log accounting data to a local text file, to a SQL Server database, or to both. NPS can also log to a SQL Server ...
  60. NPS cannot import templates from the remote computer because the remote computer does not support templates. Either install ...
  61. NPS cannot import templates from the remote computer because the remote computer is not an NPS server. Either install NPS ...
  62. NPS cannot import templates from the template configuration file because either the file is corrupted or it is not a valid ...
  63. NPS cannot import the configuration file because either the file is corrupted or it is not a valid NPS configuration file. ...
  64. NPS cannot import the configuration file because either the file is corrupted or it is not a valid NPS configuration file. ...
  65. NPS cannot import the configuration file because either the file is corrupted or it is not a valid NPS configuration file. ...
  66. NPS cannot log accounting information in the primary data store (%1). Because of this, NPS is now logging accounting information ...
  67. NPS cannot log accounting information in the primary data store (%1). Due to this logging failure, NPS will discard all connection ...
  68. NPS cannot log accounting information in the primary data store (%1). NPS will continue to process connection requests without ...
  69. NPS cannot log accounting information in the secondary data store (%1). Due to this logging failure, NPS will discard all ...
  70. NPS cannot log accounting information in the secondary data store (%1). NPS will continue to process connection requests ...
  71. NPS configured as a NAP health policy server processes connection requests and enforces NAP client health policy locally ...
  72. NPS configured as a RADIUS proxy forwards connection requests to other RADIUS servers that are members of a remote RADIUS ...
  73. NPS configured as a RADIUS server processes connection requests locally by performing authentication and authorization. To ...
  74. npsdb is variable that contains the new name of the new database. - The UI will declare the variable and initialize it based ...
  75. NSAP Network Service Access Point (NSAP) address record. Maps a DNS domain name to a single NSAP address of any supported ...