Windows 8
- Registry Editor could not save the security information. The key currently selected does not give you access to save such ...
- Registry Editor could not set security in all subkeys. The key currently selected contains one or more inaccessible subkeys. ...
- Registry Editor could not set security in all subkeys. The key currently selected contains one or more subkeys marked for ...
- Registry Editor could not set security in the key currently selected, or some of its subkeys. These keys do not give you ...
- Registry File Failure} The registry cannot load the hive (file): %hs or its log or alternate. It is corrupt, absent, or not ...
- Registry Hive Recovered} Registry hive (file): %hs was corrupted and it has been recovered. Some data might have been lost. ...
- Registry Hive Recovered} Registry hive (file): '%3' was corrupted and it has been recovered. Some data might have been lost. ...
- Registry policy allows an administrator to configure registry settings of any type. This policy differs significantly from ...
- Registry Quota In Use is the percentage of the Total Registry Quota Allowed that is currently being used by the system. This ...
- Registry Recovery} One of the files containing the system's Registry data had to be recovered by use of a log or alternate ...
- Registry security settings Allows an administrator to define access permissions (on discretionary access control lists (DACLs)) ...
- Registry This policy setting allows you to audit attempts to access registry objects. A security audit event is generated ...
- RegNotifyChangeKeyValue failed with a return code of %1. Initialization will continue, but registry changes will not be updated ...
- Regularly run data deduplication at low priority and pause data deduplication when the system is busy to minimize the impact ...
- Rehosts all the read-only partitions on a Global Catalog. This command disables connection translation, enables strict replication ...
- Reject (This client is on the affinity list of another cluster node although this node owns handling traffic from the client) ...
- Reject (This cluster node does not own handling traffic from this client and this client is not on the affinity list of this ...
- Reject (While the extended affinity list is in the current transition state, connections from this client will not be handled) ...
- Relay Packets Received : %1!u! Success : %2!u! (Bubble %3!u!, Data %4!u!) Failure : %5!u! (Hdr %6!u!, Src %7!u!, Dest %8!u!) ...
- Reliability index values for %s: Beginning value - %02.02f; Ending value - %02.02f; Minimum value: %02.02f; Maximum value: ...
- Reliability Monitor does not have up to date data for this computer because RACTask might be disabled or configured for optimal ...
- Reliable Multicast Protocol. An implemention of the Pragmatic General Multicast Protocol (Pgm) for adding a degree of reliability ...
- Relog creates new performance logs from data in existing performance logs by changing the sampling rate and/or converting ...
- Remaps the color intensities of the input bitmap based on a discrete function generated by a user specified list of values ...
- Remaps the color intensities of the input bitmap based on a transfer function generated by a user specified list of values ...
- Remaps the color intensities of the input bitmap based on a user specified gamma transfer function for each RGBA channel. ...
- Remaps the color intensities of the input bitmap based on a user specified linear transfer function for each RGBA channel. ...
- Remarks: - Add a new mainmode rule to the firewall policy. - Rule name should be unique and cannot be "all". - Computerpsk ...
- Remarks: - Rule name should be unique and cannot be "all". - When mode=tunnel,tunnel endpoints must be specified, except ...
- Remarks: - Sets a new parameter value on an identified rule. The command fails if the rule does not exist. To create a rule, ...
- Remarks: -Sets a new parameter value on an identified rule. The command fails if the rule does not exist. To create a rule, ...
- Remarks: Commas that are not used as separators in distinguished names must be escaped with the backslash ("\") character ...
- Remarks: Displays whether Winsock send autotuning is enabled. Send autotuning is dynamically adjust the amount of send buffered ...
- Remarks: Dsmod quota only supports a subset of commonly used object class attributes. If a value that you use contains spaces, ...
- Remarks: Dsmod quota only supports a subset of commonly used object class attributes. If a value that you use contains spaces, ...
- Remarks: If a value that you supply contains spaces, use quotation marks around the text (for example, "CN=DC2,OU=Domain ...
- Remarks: If a value that you supply contains spaces, use quotation marks around the text (for example, "CN=John Smith,CN=Users,DC=microsoft,DC=com"). ...
- Remarks: If a value that you supply contains spaces, use quotation marks around the text (for example, "CN=John Smith,CN=Users,DC=microsoft,DC=com"). ...
- Remarks: If a value that you supply contains spaces, use quotation marks around the text (for example, "CN=John Smith,CN=Users,DC=microsoft,DC=com"). ...
- Remarks: If a value that you supply contains spaces, use quotation marks around the text (for example, "CN=John Smith,CN=Users,DC=microsoft,DC=com"). ...
- Remarks: If a value that you supply contains spaces, use quotation marks around the text (for example, "CN=John Smith,OU ...
- Remarks: If a value that you supply contains spaces, use quotation marks around the text (for example, "CN=My Server,CN=Servers,CN=Site10, ...
- Remarks: If a value that you supply contains spaces, use quotation marks around the text (for example, "CN=USA Sales,OU=Distribution ...
- Remarks: If a value that you supply contains spaces, use quotation marks around the text (for example, "OU=Domain Controllers,DC=microsoft,DC=com"). ...
- Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
- Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
- Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
- Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
- Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
- Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
- Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
- Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
- Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
- Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
- Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
- Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
- Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
- Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
- Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
- Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
- Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
- Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
- Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
- Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
- Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
- Remarks: If you do not supply a target object at the command prompt, the target object is obtained from standard input (stdin). ...
- Remarks: The dsget commands help you to view the properties of a specific object in the directory: the input to dsget is ...
- Remarks: The dsmod commands support piping of input to allow you to pipe results from the dsquery commands as input to the ...
- Remarks: The dsquery commands help you find objects in the directory that match a specified search criterion: the input to ...
- Remarks: The dsquery commands help you find objects in the directory that match a specified search criterion: the input to ...
- Remarks: The dsquery commands help you find objects in the directory that match a specified search criterion: the input to ...
- Remarks: The dsquery commands help you find objects in the directory that match a specified search criterion: the input to ...
- Remarks: The dsquery commands help you find objects in the directory that match a specified search criterion: the input to ...
- Remarks: The dsquery commands help you find objects in the directory that match a specified search criterion: the input to ...
- Remarks: The dsquery commands help you find objects in the directory that match a specified search criterion: the input to ...