Windows 8

  1. Peeks at the last message in the queue and has the optional parameters WantDestinationQueue (default set to False), WantBody ...
  2. Peeks at the message following a message with a LookupId property that is equal to the specified lookup identifier and has ...
  3. Peeks at the message preceding a message with a LookupId property that is equal to the specified lookup identifier and has ...
  4. Peer caching is a BITS 3.0 feature which allows peers (same subnet computers with peer caching enabled) to share files. When ...
  5. Peer Name Resolution Protocol allows applications to register and resolve names on your computer so that other computers ...
  6. Peer Name Resolution Protocol allows applications to register and resolve names on your computer so that other computers ...
  7. Peer with IP address %1 was unable to receive RIP message sent out from interface with IP address %2. The peer might be rebooting, ...
  8. Pending Device Policy: Policy: %s Poll interval: %d seconds Max retry count: %d times Message to pending clients: %s Retention ...
  9. People must have a user account and password for this computer to access shared folders. To change this setting, use the ...
  10. People without a user account and password for this computer can access folders shared with everyone. To change this setting, ...
  11. Per IP Rate Limit Queues is the current number of per internal IP address rate limit queues for unauthenticated IKEv1, IKEv2, ...
  12. Per User Audit Policy Change: User: %1 Category: %2 Sub Category: %3 Sub Category Guid: %4 Changes: %5 Changed By: User Name: ...
  13. Per User Audit Policy was changed. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Policy For Account: ...
  14. Per user auditing policy set for user: Target user: %1 Policy ID: %2 Category Settings: System: %3 Logon: %4 Object Access ...
  15. Percentage of 1-second intervals that a 1080p video played with medium glitches, but no major glitches at 30 frames per second. ...
  16. Percentage of 1-second intervals that a 1080p video played with medium glitches, but no major glitches at 60 frames per second. ...
  17. Percentage of 1-second intervals that a 360p video played with medium glitches, but no major glitches at 30 frames per second. ...
  18. Percentage of 1-second intervals that a 480p video played with medium glitches, but no major glitches at 30 frames per second. ...
  19. Percentage of 1-second intervals that a 720p video played with medium glitches, but no major glitches at 30 frames per second. ...
  20. Perform access checks at the process and component level. Security property will be included on the object context. The COM+ ...
  21. Perform access checks only at the process level. Security property will not be included on the object context. COM+ security ...
  22. Perform one-time password synchronization from the specified username %s of this Active Directory domain to the directory ...
  23. Perform volume maintenance tasks This security setting determines which users and groups can run maintenance tasks on a volume, ...
  24. Performance counter %1 has tripped its alert threshold. The counter value of %2 is over the limit value of %4. %4 is the ...
  25. Performance counter %1 has tripped its alert threshold. The counter value of %2 is under the limit value of %4. %4 is the ...
  26. Performance counters are started on servers {0}. Allow at least 30 minutes for performance data to be collected and displayed ...
  27. Performance counters for the %1!s! (%2!s!) service are already in the registry, no need to reinstall. This only happens when ...
  28. Performance counters for the %1!s! (%2!s!) service were loaded successfully. The Record Data in the data section contains ...
  29. Performance counters for the %1!s! (%2!s!) service were removed successfully. The Record Data contains the new values of ...
  30. Performance counters will not be loaded because the named objects (shared memory or events) are in use for %1 for instance ...
  31. Performance Limit is the performance the processor guarantees it can provide, as a percentage of the nominal performance ...
  32. Performance Logs and Alerts Collects performance data from local or remote computers based on preconfigured schedule parameters, ...
  33. Performance Logs and Alerts Collects performance data from local or remote computers based on preconfigured schedule parameters, ...
  34. Performance monitoring cannot be initialized because the counters are not loaded or the shared memory object cannot be opened. ...
  35. Performance monitoring cannot be initialized for the gatherer object, because the counters are not loaded or the shared memory ...
  36. Performance monitoring cannot be initialized for the gatherer service, because the counters are not loaded or the shared ...
  37. Performance monitoring cannot be initialized for the topic assistant object, because the counters are not loaded or the shared ...
  38. Performance monitoring cannot be initialized. This affects performance counters only. Try restarting the service or restarting ...
  39. Performance power management features on Hyper-V logical processor %2 are disabled due to a firmware problem. Check with ...
  40. Performance power management features on processor %1 are disabled due to a firmware problem. Check with the computer manufacturer ...
  41. Performance power management features on processor %2 in group %1 are disabled due to a firmware problem. Check with the ...
  42. Performance problems might occur on the virtual machine or application that use the virtual hard disk. This impacts the following ...
  43. Performance statistics for module '%1': - Total file count: %2 - Total time spent (s): %3 - Average time spent per file (ms): ...
  44. Performance threshold values have been reached. Trap processing is being quiesed. Further traps will not be sent without ...
  45. Performance threshold values have been set by operator intervention. Current settings indicate performance thresholds have ...
  46. Performance warning: replication was delayed while applying changes to the following object. If this message occurs frequently, ...
  47. Performance warning: replication was delayed while applying changes to the following object. If this message occurs frequently, ...
  48. Performing this operation erases all data on the disk and initializes it as a GPT disk. Back up any data that you want to ...
  49. Performs conditional processing in batch programs. IF NOT ERRORLEVEL number command IF NOT string1=string2 command IF NOT ...
  50. Performs networking tasks associated with configuration and maintenance of homegroups. If this service is stopped or disabled, ...
  51. Performs TCP/IP configuration for DHCP clients, including dynamic assignments of IP addresses, specification of the WINS ...
  52. Performs the needed configuration to get a newly installed WSUS server up and running PostInstall SQL_INSTANCE_NAME= CONTENT_DIR= ...
  53. PERFTRACK (Init-Dora): Offer is accepted on the interface %2 after toggling the broadcast bit in INIT. Offered Address is ...
  54. PERFTRACK (Request-Ack): Address confirmed for the interface %2 after toggling the broadcast bit in INIT-REBOOT. Confirmed ...
  55. PERFTRACK (Request-Nack-Dora): Offer is accepted on the interface %2 after toggling the broadcast bit in INIT-REBOOT. Offered ...
  56. PERFTRACK (Request-NoResponse): There is no response for INIT-REBOOT Request on interface %2. Gateway is not reachable and ...
  57. PERFTRACK: Setting up Fallback configuration on the interface %2 since no response is received for request. Status code is ...
  58. Permanently stop the backup schedule. The backup storage disk is released for normal use and the data on the disk is preserved. ...
  59. Permission denied; you do not have sufficient permissions to accept or decline the Microsoft Software License Terms for this ...
  60. Permission information specifying who can join object %2 to a domain cannot be written because: %1 The computer account will ...
  61. Permissions compatible with pre-Windows 2000 servers will be used with this domain; this will allow anonymous access to domain ...
  62. Permissions on an object were changed. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: ...
  63. Permissions to access the files on a share are set using a combination of folder permissions, share permissions, and, optionally, ...
  64. Persistent Reservation READ KEYS failed to find reservation holder's key 0x{0:x} after a called to PREEMPT using RESERVATION ...
  65. Persistent Reservation Registration key 0x{0:x} for Test Disk {1} from node {2} was not removed by the call to PREEMPT using ...
  66. Persistent Reservation Registration key 0x{0:x} for Test Disk {1} from node {2} was not removed by the call to RESERVE using ...
  67. Persistent Reservation Registration key 0x{0:x} for Test Disk {1} reservation holder node {2} was not removed by the call ...
  68. Persisting disk caches was slower than expected: Name : %3 Total Time : %4ms Degradation Time : %5ms Incident Time (UTC) ...
  69. Persona Grata commands are inaccessible when Persona Mode is set to Non-Grata. Please change Persona Mode to Grata before ...
  70. Persona Non-Grata commands are inaccessible when Persona Mode is set to Grata. Please change Persona Mode to Non-Grata before ...
  71. Personally identifiable online and physical contact information, as well as to other information linked to an identifiable ...
  72. PFXInFileList - Comma separated PFX input file list EPF - EPF output file %1 - Use CAST 64 encryption %2 - Use CAST 64 encryption ...
  73. PFXInFileList - Comma separated PFX input file list PFXOutFile - PFX output file %9 - Include extended properties The password ...
  74. Phishing threat: This is a phishing website that impersonates a trusted website to trick you into revealing personal or financial ...
  75. Phone Dialer was unable to find a telephone device or modem to use to dial voice calls. In Control Panel, double-click the ...