Windows 8
- Peeks at the last message in the queue and has the optional parameters WantDestinationQueue (default set to False), WantBody ...
- Peeks at the message following a message with a LookupId property that is equal to the specified lookup identifier and has ...
- Peeks at the message preceding a message with a LookupId property that is equal to the specified lookup identifier and has ...
- Peer caching is a BITS 3.0 feature which allows peers (same subnet computers with peer caching enabled) to share files. When ...
- Peer Name Resolution Protocol allows applications to register and resolve names on your computer so that other computers ...
- Peer Name Resolution Protocol allows applications to register and resolve names on your computer so that other computers ...
- Peer with IP address %1 was unable to receive RIP message sent out from interface with IP address %2. The peer might be rebooting, ...
- Pending Device Policy: Policy: %s Poll interval: %d seconds Max retry count: %d times Message to pending clients: %s Retention ...
- People must have a user account and password for this computer to access shared folders. To change this setting, use the ...
- People without a user account and password for this computer can access folders shared with everyone. To change this setting, ...
- Per IP Rate Limit Queues is the current number of per internal IP address rate limit queues for unauthenticated IKEv1, IKEv2, ...
- Per User Audit Policy Change: User: %1 Category: %2 Sub Category: %3 Sub Category Guid: %4 Changes: %5 Changed By: User Name: ...
- Per User Audit Policy was changed. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Policy For Account: ...
- Per user auditing policy set for user: Target user: %1 Policy ID: %2 Category Settings: System: %3 Logon: %4 Object Access ...
- Percentage of 1-second intervals that a 1080p video played with medium glitches, but no major glitches at 30 frames per second. ...
- Percentage of 1-second intervals that a 1080p video played with medium glitches, but no major glitches at 60 frames per second. ...
- Percentage of 1-second intervals that a 360p video played with medium glitches, but no major glitches at 30 frames per second. ...
- Percentage of 1-second intervals that a 480p video played with medium glitches, but no major glitches at 30 frames per second. ...
- Percentage of 1-second intervals that a 720p video played with medium glitches, but no major glitches at 30 frames per second. ...
- Perform access checks at the process and component level. Security property will be included on the object context. The COM+ ...
- Perform access checks only at the process level. Security property will not be included on the object context. COM+ security ...
- Perform one-time password synchronization from the specified username %s of this Active Directory domain to the directory ...
- Perform volume maintenance tasks This security setting determines which users and groups can run maintenance tasks on a volume, ...
- Performance counter %1 has tripped its alert threshold. The counter value of %2 is over the limit value of %4. %4 is the ...
- Performance counter %1 has tripped its alert threshold. The counter value of %2 is under the limit value of %4. %4 is the ...
- Performance counters are started on servers {0}. Allow at least 30 minutes for performance data to be collected and displayed ...
- Performance counters for the %1!s! (%2!s!) service are already in the registry, no need to reinstall. This only happens when ...
- Performance counters for the %1!s! (%2!s!) service were loaded successfully. The Record Data in the data section contains ...
- Performance counters for the %1!s! (%2!s!) service were removed successfully. The Record Data contains the new values of ...
- Performance counters will not be loaded because the named objects (shared memory or events) are in use for %1 for instance ...
- Performance Limit is the performance the processor guarantees it can provide, as a percentage of the nominal performance ...
- Performance Logs and Alerts Collects performance data from local or remote computers based on preconfigured schedule parameters, ...
- Performance Logs and Alerts Collects performance data from local or remote computers based on preconfigured schedule parameters, ...
- Performance monitoring cannot be initialized because the counters are not loaded or the shared memory object cannot be opened. ...
- Performance monitoring cannot be initialized for the gatherer object, because the counters are not loaded or the shared memory ...
- Performance monitoring cannot be initialized for the gatherer service, because the counters are not loaded or the shared ...
- Performance monitoring cannot be initialized for the topic assistant object, because the counters are not loaded or the shared ...
- Performance monitoring cannot be initialized. This affects performance counters only. Try restarting the service or restarting ...
- Performance power management features on Hyper-V logical processor %2 are disabled due to a firmware problem. Check with ...
- Performance power management features on processor %1 are disabled due to a firmware problem. Check with the computer manufacturer ...
- Performance power management features on processor %2 in group %1 are disabled due to a firmware problem. Check with the ...
- Performance problems might occur on the virtual machine or application that use the virtual hard disk. This impacts the following ...
- Performance statistics for module '%1': - Total file count: %2 - Total time spent (s): %3 - Average time spent per file (ms): ...
- Performance threshold values have been reached. Trap processing is being quiesed. Further traps will not be sent without ...
- Performance threshold values have been set by operator intervention. Current settings indicate performance thresholds have ...
- Performance warning: replication was delayed while applying changes to the following object. If this message occurs frequently, ...
- Performance warning: replication was delayed while applying changes to the following object. If this message occurs frequently, ...
- Performing this operation erases all data on the disk and initializes it as a GPT disk. Back up any data that you want to ...
- Performs conditional processing in batch programs. IF NOT ERRORLEVEL number command IF NOT string1=string2 command IF NOT ...
- Performs networking tasks associated with configuration and maintenance of homegroups. If this service is stopped or disabled, ...
- Performs TCP/IP configuration for DHCP clients, including dynamic assignments of IP addresses, specification of the WINS ...
- Performs the needed configuration to get a newly installed WSUS server up and running PostInstall SQL_INSTANCE_NAME= CONTENT_DIR= ...
- PERFTRACK (Init-Dora): Offer is accepted on the interface %2 after toggling the broadcast bit in INIT. Offered Address is ...
- PERFTRACK (Request-Ack): Address confirmed for the interface %2 after toggling the broadcast bit in INIT-REBOOT. Confirmed ...
- PERFTRACK (Request-Nack-Dora): Offer is accepted on the interface %2 after toggling the broadcast bit in INIT-REBOOT. Offered ...
- PERFTRACK (Request-NoResponse): There is no response for INIT-REBOOT Request on interface %2. Gateway is not reachable and ...
- PERFTRACK: Setting up Fallback configuration on the interface %2 since no response is received for request. Status code is ...
- Permanently stop the backup schedule. The backup storage disk is released for normal use and the data on the disk is preserved. ...
- Permission denied; you do not have sufficient permissions to accept or decline the Microsoft Software License Terms for this ...
- Permission information specifying who can join object %2 to a domain cannot be written because: %1 The computer account will ...
- Permissions compatible with pre-Windows 2000 servers will be used with this domain; this will allow anonymous access to domain ...
- Permissions on an object were changed. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: ...
- Permissions to access the files on a share are set using a combination of folder permissions, share permissions, and, optionally, ...
- Persistent Reservation READ KEYS failed to find reservation holder's key 0x{0:x} after a called to PREEMPT using RESERVATION ...
- Persistent Reservation Registration key 0x{0:x} for Test Disk {1} from node {2} was not removed by the call to PREEMPT using ...
- Persistent Reservation Registration key 0x{0:x} for Test Disk {1} from node {2} was not removed by the call to RESERVE using ...
- Persistent Reservation Registration key 0x{0:x} for Test Disk {1} reservation holder node {2} was not removed by the call ...
- Persisting disk caches was slower than expected: Name : %3 Total Time : %4ms Degradation Time : %5ms Incident Time (UTC) ...
- Persona Grata commands are inaccessible when Persona Mode is set to Non-Grata. Please change Persona Mode to Grata before ...
- Persona Non-Grata commands are inaccessible when Persona Mode is set to Grata. Please change Persona Mode to Non-Grata before ...
- Personally identifiable online and physical contact information, as well as to other information linked to an identifiable ...
- PFXInFileList - Comma separated PFX input file list EPF - EPF output file %1 - Use CAST 64 encryption %2 - Use CAST 64 encryption ...
- PFXInFileList - Comma separated PFX input file list PFXOutFile - PFX output file %9 - Include extended properties The password ...
- Phishing threat: This is a phishing website that impersonates a trusted website to trick you into revealing personal or financial ...
- Phone Dialer was unable to find a telephone device or modem to use to dial voice calls. In Control Panel, double-click the ...