Windows 8

  1. Protection is enabled on the volume but has been suspended. This is likely to have happened due to an update being applied ...
  2. Protection of auditable protected data was attempted. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ...
  3. Protection of auditable protected data. Data Description: %2 Key Identifier: %1 Protected Data Flags: %3 Protection Algorithms: ...
  4. Provide new credentials for "%ws" Open the Save/Replace credentials dialog box to replace the existing credentials or delete ...
  5. Provide the location of the UNIX-based NIS map source files. You can either copy the files to a local directory or enter ...
  6. Provide the user name and password to use for scheduling the backup. The user account must have write permission to the remote ...
  7. Provided payload does not match with the template that was defined for event id {0}. The defined template is following: {1} ...
  8. Provider %1 did not close its registered endpoints during shutdown. There are %2 endpoints still open. Providers are required ...
  9. Provider %1 failed to initialize but still has %2 registered endpoints. Providers are required to close all endpoints and ...
  10. Provider %1 failed to modify a device with status code %5: Device Name: %2 New Metadata: %3 Note that the device may or may ...
  11. Provider %1 was loaded from %2 and initialized successfully but provider did not register required callback functions. These ...
  12. Provider %1 was loaded from %2 and initialized successfully but the provider did not register the required callback functions. ...
  13. Provider already registered. To add users or change credentials, unregister the provider and then re-register with the correct ...
  14. Provider returned incorrect type for property, ignoring (custom property may have been registered with different types on ...
  15. provider`p`provider flags level]`A single Event Trace provider to enable. The terms 'Flags' and 'Keywords' are synonymous ...
  16. Provides a common interface and object model to access management information about operating system, devices, applications ...
  17. Provides a messaging infrastructure and development tool for creating distributed messaging applications for Windows-based ...
  18. Provides a method that initiates a new internal transaction and returns an MSMQ transaction object representing the new underlying ...
  19. Provides a method that initiates a new MS DTC external transaction and returns an MSMQ transaction object representing the ...
  20. Provides a network service that processes requests to simulate application of Group Policy settings for a target user or ...
  21. Provides a space for you to type a server name or a domain name. You can use wildcards in the domain name. Some examples ...
  22. Provides a way to add comments to a script. Syntax: REM Example: In this example script, REM is used to provide a comment ...
  23. Provides administrative services for IIS, for example configuration history and Application Pool account mapping. If this ...
  24. Provides automatic IPv6 connectivity over an IPv4 network. If this service is stopped, the machine will only have IPv6 connectivity ...
  25. Provides content indexing and property caching for file, email and other content (via extensibility APIs). The service responds ...
  26. Provides identity services for the Peer Name Resolution Protocol (PNRP) and Peer-to-Peer Grouping services. If disabled, ...
  27. Provides information protection technology for the enterprise that works with RMS-enabled applications to help safeguard ...
  28. Provides infrastructure support for Windows Store.This service is started on demand and if disabled applications bought using ...
  29. Provides management services for disks, volumes, file systems, and, hardware array objects such as subsystems, luns, controllers, ...
  30. Provides Network Access Protection enforcement for EAP authenticated network connections, such as those used with 802.1X ...
  31. Provides network address translation, addressing, name resolution and/or intrusion prevention services for a home or small ...
  32. Provides no integrity protection for the packet payload or IP header. Use this option only to support network devices and ...
  33. Provides performance library information from Windows Management Instrumentation (WMI) providers to clients on the network. ...
  34. Provides performance library information from Windows Management Instrumentation (WMI) providers to clients on the network. ...
  35. Provides properties that return information about the Message Queuing service on a computer and methods that perform general ...
  36. Provides properties that specify an underlying MS DTC external transaction object or internal transaction object and the ...
  37. Provides registered licenses for Remote Desktop Services clients. If this service is stopped, the server will be unavailable ...
  38. Provides registered licenses for Remote Desktop Services clients. If this service is stopped, the server will be unavailable ...
  39. Provides rule-based monitoring of messages arriving in a Message Queuing queue and, when the conditions of a rule are satisfied, ...
  40. Provides secure remote connectivity to remote computers on your corporate network, from anywhere on the Internet. If this ...
  41. Provides server-level role management and licensing services to help licensees stay within the terms of their licensing agreements. ...
  42. Provides support for collaboration outside the enterprise boundaries that works with ADFS passive protocol federation and ...
  43. Provides support for out-of-process session states for ASP.NET. If this service is stopped, out-of-process requests will ...
  44. Provides support for the NetBIOS over TCP/IP (NetBT) service and NetBIOS name resolution for clients on the network, therefore ...
  45. Provides support for the Secure Socket Tunneling Protocol (SSTP) to connect to remote computers using VPN. If this service ...
  46. Provides Telephony API (TAPI) support for programs that control telephony devices on the local computer and, through the ...
  47. Provides the core file encryption technology used to store encrypted files on NTFS file system volumes. If this service is ...
  48. Provides the Failover Cluster Manager snap-in, the Cluster-Aware Updating interface, and the Failover Cluster module for ...
  49. Provides the properties that define a queue and methods for creating, opening, and deleting the queue and for setting and ...
  50. Provides three management services: Catalog Database Service, which confirms the signatures of Windows files and allows new ...
  51. Provides tunnel connectivity using IPv6 transition technologies (6to4, ISATAP, Port Proxy, and Teredo), and IP-HTTPS. If ...
  52. Provides User Account Control validation for the installation of ActiveX controls from the Internet and enables management ...
  53. Provides Windows PowerShell cmdlets for managing failover clusters. It also includes the Cluster-Aware Updating module for ...
  54. Provides X.509 certificate and key management services for the Network Access Protection Agent (NAPAgent). Enforcement technologies ...
  55. Providing samples of your handwriting increases the likelihood of your writing being recognized correctly. For best results, ...
  56. Proxy configuration is not set correctly. Check the web.config file to ensure that the database connection string is correct. ...
  57. Proxy creation has been skipped for '{0}' command, because Windows PowerShell couldn't verify safety of a name of one of ...
  58. Proxy creation has been skipped for '{0}' command, because Windows PowerShell couldn't verify safety of a name of one of ...
  59. Proxy creation has been skipped for '{0}' command, because Windows PowerShell couldn't verify safety of a name of one of ...
  60. Proxy creation has been skipped for the following command: '{0}', because it would shadow an existing local command. Use ...
  61. Proxy credentials cannot be specified when using the following proxy access type: {0}. Either specify a different access ...
  62. PSSession Configuration File path '{0}' is not valid. The path argument must resolve to a single file in the file system ...
  63. PSXSS has encountered a user or group ID with a value that requires careful POSIX offset management. See Knowledge Base article ...
  64. PSXSS has encountered a user or group ID with a value too large to convert to a uid_t, and converted it to a reserved UID ...
  65. Public folders can not be indexed unless they are cached locally. To enable indexing you need to adjust your Outlook mail ...
  66. Public Key (KEY) Public key (KEY) record. Stores a public key that is related to a DNS domain name. This public key can be ...
  67. Public networks, such as those in airports and coffee shops (not recommended because these networks often have little or ...
  68. Public networks, such as those in airports and coffee shops (not recommended because these networks often have little or ...
  69. Publisher property %1!s! contains invalid value. The value has invalid type, is outside of valid range, can't be updated ...
  70. Publishes this computer and resources attached to this computer so they can be discovered over the network. If this service ...
  71. Purges the metadata for unnecessary update revisions from the database. This is useful for managing WSUS with an MSDE database. ...
  72. Push interval must be of the form '[days:]hh:]mm' (non-zero) where Days : is a non-negative integer hh(hours) : is a non-negative ...
  73. Push publishing points are started when the encoder starts pushing the stream. This publishing point cannot be started by ...
  74. Putting the computer into hibernation or standby may stop playback. You will have to click Play to resume playback. The content ...
  75. pwlauncher.exe - Windows To Go startup options command-line tool. The pwlauncher.exe command-line tool is used to query or ...