Windows 8

  1. Registry Editor could not save the security information. The key currently selected does not give you access to save such ...
  2. Registry Editor could not set security in all subkeys. The key currently selected contains one or more inaccessible subkeys. ...
  3. Registry Editor could not set security in all subkeys. The key currently selected contains one or more subkeys marked for ...
  4. Registry Editor could not set security in the key currently selected, or some of its subkeys. These keys do not give you ...
  5. Registry File Failure} The registry cannot load the hive (file): %hs or its log or alternate. It is corrupt, absent, or not ...
  6. Registry Hive Recovered} Registry hive (file): %hs was corrupted and it has been recovered. Some data might have been lost. ...
  7. Registry Hive Recovered} Registry hive (file): '%3' was corrupted and it has been recovered. Some data might have been lost. ...
  8. Registry policy allows an administrator to configure registry settings of any type. This policy differs significantly from ...
  9. Registry Quota In Use is the percentage of the Total Registry Quota Allowed that is currently being used by the system. This ...
  10. Registry Recovery} One of the files containing the system's Registry data had to be recovered by use of a log or alternate ...
  11. Registry security settings Allows an administrator to define access permissions (on discretionary access control lists (DACLs)) ...
  12. Registry This policy setting allows you to audit attempts to access registry objects. A security audit event is generated ...
  13. RegNotifyChangeKeyValue failed with a return code of %1. Initialization will continue, but registry changes will not be updated ...
  14. Regularly run data deduplication at low priority and pause data deduplication when the system is busy to minimize the impact ...
  15. Rehosts all the read-only partitions on a Global Catalog. This command disables connection translation, enables strict replication ...
  16. Reject (This client is on the affinity list of another cluster node although this node owns handling traffic from the client) ...
  17. Reject (This cluster node does not own handling traffic from this client and this client is not on the affinity list of this ...
  18. Reject (While the extended affinity list is in the current transition state, connections from this client will not be handled) ...
  19. Relay Packets Received : %1!u! Success : %2!u! (Bubble %3!u!, Data %4!u!) Failure : %5!u! (Hdr %6!u!, Src %7!u!, Dest %8!u!) ...
  20. Reliability index values for %s: Beginning value - %02.02f; Ending value - %02.02f; Minimum value: %02.02f; Maximum value: ...
  21. Reliability Monitor does not have up to date data for this computer because RACTask might be disabled or configured for optimal ...
  22. Reliable Multicast Protocol. An implemention of the Pragmatic General Multicast Protocol (Pgm) for adding a degree of reliability ...
  23. Relog creates new performance logs from data in existing performance logs by changing the sampling rate and/or converting ...
  24. Remaps the color intensities of the input bitmap based on a discrete function generated by a user specified list of values ...
  25. Remaps the color intensities of the input bitmap based on a transfer function generated by a user specified list of values ...
  26. Remaps the color intensities of the input bitmap based on a user specified gamma transfer function for each RGBA channel. ...
  27. Remaps the color intensities of the input bitmap based on a user specified linear transfer function for each RGBA channel. ...
  28. Remarks: - Add a new mainmode rule to the firewall policy. - Rule name should be unique and cannot be "all". - Computerpsk ...
  29. Remarks: - Rule name should be unique and cannot be "all". - When mode=tunnel,tunnel endpoints must be specified, except ...
  30. Remarks: - Sets a new parameter value on an identified rule. The command fails if the rule does not exist. To create a rule, ...
  31. Remarks: -Sets a new parameter value on an identified rule. The command fails if the rule does not exist. To create a rule, ...
  32. Remarks: Commas that are not used as separators in distinguished names must be escaped with the backslash ("\") character ...
  33. Remarks: Displays whether Winsock send autotuning is enabled. Send autotuning is dynamically adjust the amount of send buffered ...
  34. Remarks: Dsmod quota only supports a subset of commonly used object class attributes. If a value that you use contains spaces, ...
  35. Remarks: Dsmod quota only supports a subset of commonly used object class attributes. If a value that you use contains spaces, ...
  36. Remarks: If a value that you supply contains spaces, use quotation marks around the text (for example, "CN=DC2,OU=Domain ...
  37. Remarks: If a value that you supply contains spaces, use quotation marks around the text (for example, "CN=John Smith,CN=Users,DC=microsoft,DC=com"). ...
  38. Remarks: If a value that you supply contains spaces, use quotation marks around the text (for example, "CN=John Smith,CN=Users,DC=microsoft,DC=com"). ...
  39. Remarks: If a value that you supply contains spaces, use quotation marks around the text (for example, "CN=John Smith,CN=Users,DC=microsoft,DC=com"). ...
  40. Remarks: If a value that you supply contains spaces, use quotation marks around the text (for example, "CN=John Smith,CN=Users,DC=microsoft,DC=com"). ...
  41. Remarks: If a value that you supply contains spaces, use quotation marks around the text (for example, "CN=John Smith,OU ...
  42. Remarks: If a value that you supply contains spaces, use quotation marks around the text (for example, "CN=My Server,CN=Servers,CN=Site10, ...
  43. Remarks: If a value that you supply contains spaces, use quotation marks around the text (for example, "CN=USA Sales,OU=Distribution ...
  44. Remarks: If a value that you supply contains spaces, use quotation marks around the text (for example, "OU=Domain Controllers,DC=microsoft,DC=com"). ...
  45. Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
  46. Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
  47. Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
  48. Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
  49. Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
  50. Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
  51. Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
  52. Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
  53. Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
  54. Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
  55. Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
  56. Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
  57. Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
  58. Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
  59. Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
  60. Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
  61. Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
  62. Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
  63. Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
  64. Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
  65. Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
  66. Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
  67. Remarks: The dsget commands help you to view the properties of a specific object in the directory: the input to dsget is ...
  68. Remarks: The dsmod commands support piping of input to allow you to pipe results from the dsquery commands as input to the ...
  69. Remarks: The dsquery commands help you find objects in the directory that match a specified search criterion: the input to ...
  70. Remarks: The dsquery commands help you find objects in the directory that match a specified search criterion: the input to ...
  71. Remarks: The dsquery commands help you find objects in the directory that match a specified search criterion: the input to ...
  72. Remarks: The dsquery commands help you find objects in the directory that match a specified search criterion: the input to ...
  73. Remarks: The dsquery commands help you find objects in the directory that match a specified search criterion: the input to ...
  74. Remarks: The dsquery commands help you find objects in the directory that match a specified search criterion: the input to ...
  75. Remarks: The dsquery commands help you find objects in the directory that match a specified search criterion: the input to ...