Windows 8

  1. Plug an Ethernet cable into the network adapter "%InterfaceName%" An Ethernet cable looks like a telephone cable but with ...
  2. Plug an Ethernet cable into this computer An Ethernet cable looks like a telephone cable but with larger connectors on the ...
  3. Plug in your external hard disk or USB flash drive. After you click Yes, you'll browse to the location where Windows Easy ...
  4. Plug-in registration store is corrupt: value is malformed. ("{0}") For any custom plug-in, try unregistering, correcting ...
  5. Plug-in registration store is corrupt: value is wrong type or missing. ("{0}") For any custom plug-in, try unregistering, ...
  6. Pointer (PTR) Pointer (PTR) record. Points to a location in the domain name space. PTR records are typically used in special ...
  7. Policy Logging for Software Management failed to log conflict entries for application %1!s! from policy %2!s!, the error ...
  8. Policy Logging for Software Management failed to write the log entry for application category %1!s!, the error was %2!x!. ...
  9. Policy module for product %1!s!, company %2!s! returned critical error %3!d! while processing request, all requests to this ...
  10. Policy server unreachable = %1!s! Remediation server unreachable = %2!s! System Health Agent failure = %3!s! NAP server failure ...
  11. POLICY0002: Could not parse policy data.{0}Line number: {1}, Column number: {2}, Error token: '{3}' in line: '{4}'.{5}Parser ...
  12. POLICY0010: Processing has terminated because an internal inconsistency has been detected. Detailed information may have ...
  13. POLICY0025: No conditions in the claim rule match the condition tag specified in the ClaimPropertyAccessExpression: '{0}'. ...
  14. POLICY0038: A serious internal error was encountered during an attempt to parse a claims policy rule. The parser is in a ...
  15. Pool Nonpaged Allocs is the number of calls to allocate space in the nonpaged pool. The nonpaged pool is an area of system ...
  16. Pool Nonpaged Bytes is the size, in bytes, of the nonpaged pool, an area of the system virtual memory that is used for objects ...
  17. Pool Paged Allocs is the number of calls to allocate space in the paged pool. The paged pool is an area of the system virtual ...
  18. Pool Paged Bytes is the size, in bytes, of the paged pool, an area of the system virtual memory that is used for objects ...
  19. Pool Paged Resident Bytes is the size, in bytes, of the portion of the paged pool that is currently resident and active in ...
  20. Pop-up blocked. Also, to help protect your security, your web browser blocked other content from this site. Click here for ...
  21. Pop-ups temporarily allowed. Also, to help protect your security, your web browser blocked other content from this site. ...
  22. Port %1 supports only the Permit All Traffic security option, so the security option that you specified has been removed. ...
  23. Port 443 or the HTTPS protocol is blocked on the Remote Access server. 2. Port 88 or 464 is blocked on the Remote Access ...
  24. Port configured for certificate-based authentication is not valid. The port cannot be 0. The default port (443) will be used ...
  25. Port configured for certificate-based authentication is not valid. The port cannot be larger than 65535. The default port ...
  26. Port configured for Kerberos authentication is not valid. The port cannot be 0. The default port (80) will be used instead. ...
  27. Port configured for Kerberos authentication is not valid. The port cannot be larger than 65535. The default port (80) will ...
  28. Port mirroring allows the network traffic of a virtual machine to be monitored by copying incoming and outgoing packets and ...
  29. Port numbers for both authentication modes in Replication Configuration cannot be same. Provide valid port numbers to continue. ...
  30. Port(%1): Account is disabled and user is non-domain joined. Authentication will be tried with alternate credentials profile. ...
  31. Port(%1): The session id (%2) received with the UI response is different than the session id for which the request was sent ...
  32. Port-translation has been disabled but no address-pool is configured. Note that no machines will be able to share this interface ...
  33. Portal groups are a way for a target to manage sessions with connections across multiple network portals. The network portals ...
  34. Portals are associated with the specified portal group and must first be deassociated before the portal group can be deleted. ...
  35. Ports can only be specified if the protocol is TCP or UDP. Port ranges are only supported when action="noauthentication". ...
  36. Ports on which programs want to receive incoming connections: Port Protocol Version PID Type Wildcarded Forced Name / Program ...
  37. Ports or protocols blocked on the internal or external network adapters are preventing Remote Access from functioning as ...
  38. Ports required for Kerberos authentication are blocked. Kerberos authentication is required to authenticate clients using ...
  39. Positional parameters are not supported in a Windows PowerShell Workflow. To invoke this command, use explicit parameter ...
  40. Possible disk corruption detected for executable image %1, causing application %2 to stop working with exception %3, status ...
  41. Possible leaky multicast Local Scope detected between this machine and %1, since a boundary appears to exist for %2, but ...
  42. Possible Memory Leak. Application (%1) (PID: %2) has passed a non-NULL pointer to RPC for an out parameter marked allocate(all_nodes)]. ...
  43. Post-update script failed on node "{0}". To avoid potential conflicts, Cluster-Aware Updating will stop updating this node. ...
  44. Posting this operation to a worker thread for further processing is not safe at this time because it could lead to a system ...
  45. Posting this operation to a worker thread for further processing is not safe at this time because it could lead to a system ...
  46. Power Options policy allows an administrator to configure Windows Control Panel power options including individual power ...
  47. Power states can't be confirmed because no power state was set for computer ({0}). Before calling this function, set a desired ...
  48. PowerShell Classifier for rule {0} and file {1} failed to convert the property received from PowerShell of type {2} and value ...
  49. PowerShell Classifier for rule {0} and file {1} failed to convert the property received from PowerShell of type {2} and value ...
  50. PowerShell Classifier terminated abruptly due to failure while processing file {0} in rule {1} - failure details: {2}]." ...
  51. PowerShell plugin cannot process the Connect operation as required negotiation information is either missing or not complete. ...
  52. Powershell plugin does not support the options requested. Make sure client is compatible with build %1!ls! of PowerShell. ...
  53. PowerShell plugin does not understand the option %1!ls!. Make sure the client is compatible with the build %2!ls! and the ...
  54. PowerShell server does not support the {0} {1} negotiated by the client. Make sure the client is compatible with the build ...
  55. Pragmatic General Multicast is a reliable multicast transport protocol used for applications that require ordered or unordered, ...
  56. Pre-authentication failed: User Name: %1 User ID: %2 Service Name: %3 Pre-Authentication Type: %4 Failure Code: %5 Client ...
  57. Pre-update script failed on node "{0}". To avoid potential conflicts, Cluster-Aware Updating will stop updating this node. ...
  58. Prefer CRL over OCSP responses if number of cached OCSP responses corresponding to the same CRL distribution point is greater ...
  59. Preferred bridgehead servers have been selected to support intersite replication with the following site using the following ...
  60. Prepares an existing dynamic simple volume to be used as a boot or system volume. Syntax: RETAIN This command creates a partition ...
  61. Preparing core system for sleep was slower than expected: Name : %3 Total Time : %4ms Degradation Time : %5ms Incident Time ...
  62. Preparing system memory for sleep was slower than expected: Name : %3 Total Time : %4ms Degradation Time : %5ms Incident ...
  63. Preparing system worker threads for sleep was slower than expected: Name : %3 Total Time : %4ms Degradation Time : %5ms Incident ...
  64. Preparing the video subsystem for sleep was slower than expected: Name : %3 Total Time : %4ms Degradation Time : %5ms Incident ...
  65. Preparing Winlogon for sleep was slower than expected: Name : %3 Total Time : %4ms Degradation Time : %5ms Incident Time ...
  66. Prerequisite checks for DirectAccess deployment cannot continue because the Remote Access server does not belong to a domain. ...
  67. Preshared key authentication is less secure than other authentication methods. Preshared keys are stored in plaintext. When ...
  68. Press "Select File." to choose a file to import. Make any changes to the filter settings then press "Save" to save this new ...
  69. Press and hold each button on your set-top box remote control for the button displayed. Make sure you hold the remote control ...
  70. Press and hold the Windows button, and then press the power button to enter your credentials. (Or you can press Ctrl+Alt+Delete.) ...
  71. Press any key on the keyboard to hear the name of that key. Press Caps Lock + F1 to review the full set of Narrator commands. ...
  72. Press any key on the keyboard to hear the name of that key. Press Ctrl + Alt + F1 to review the full set of Narrator commands. ...
  73. Pressing F7 turns Caret Browsing on or off. This feature puts a moveable cursor in webpages that you can use to select text ...
  74. Pressing the Windows button and Volume Up button together on your tablet can start an accessibility tool. To change which ...
  75. Pressing the Windows button and Volume up button together on your tablet can start an accessibility tool. Which accessibility ...