Windows 7
- Recovery console: Allow automatic administrative logon This security setting determines if the password for the Administrator ...
- Recovery console: Allow floppy copy and access to all drives and all folders Enabling this security option makes the Recovery ...
- Recovery could only locate up to log file: %4 (generation %5) before detecting an out of sequence logs, and could not locate ...
- Recovery of %1 to %2 failed. Error %3 Total size to recover: %4 Total size recovered: %5 Total files recovered: %6!I64d! ...
- Recovery of %1 to %2 successfully completed. Total bytes recovered: %3 Total files recovered: %4!I64d! Total files failed: ...
- Recovery of data protection master key was attempted. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ...
- Recovery of data protection master key. Key Identifier: %1 Recovery Reason: %3 Recovery Server: %2 Recovery Key ID: %4 Failure ...
- Recovery of individual files, folders, application data, or system state data from DVD or removable media is not supported. ...
- Recovery of the application to the original location is not allowed because the application is not registered with Windows ...
- Recreating the Windows Media Player media library might allow you to see your music and videos. You might need to recreate ...
- Recursion: - Query: Queries Recursed = %1!10lu! Original Questions = %2!10lu! Additional Question = %3!10lu! Total Questions ...
- Recycles the specified application pool, recycling its the worker processes. The exact application pool identifier must be ...
- Redeploying this application will reinstall the application everywhere it is already installed. Do you want to continue? ...
- Redirect files from one directory to another. This shim accepts a list of directories to redirect, a list of directories ...
- Redirect messages are sent to indicate that the node which the packet was sent to is no longer the best gateway to reach ...
- Redirect registry keys from one branch to another. This shim accepts a list of branches to redirect, a list of branches to ...
- Redirected access adjusts the access mode to enable disk maintenance operations that do not require the services and applications ...
- Redirected access is not the normal access mode for Cluster Shared Volumes and should only be used for certain maintenance ...
- Redirected files are files that are available in other locations, such as another location on your computer, another drive ...
- Redirection Options is configured by adding the following flags None(0), Drives(1), Printers(2), Clipboard(4), Plug and Play(8), ...
- Reduce interference by moving your computer Possible sources of interference include microwave ovens, cordless phones, and ...
- Reduces the size of the volume with focus by the specified amount. Makes free disk space available from unused space at the ...
- RedundancyStatus provides information on the state of the redundancy group. \"Fully Redundant\" (value=2) means that all ...
- Redundant Read} To satisfy a read request, the NT fault-tolerant file system successfully read the requested data from a ...
- Redundant Write} To satisfy a write request, the NT fault-tolerant file system successfully wrote a redundant copy of the ...
- Refer to Windows Help and Support for more information about wireless connectivity problems Windows cannot resolve your wireless ...
- Reference scope constraint '{0}' has been violated: the uri attribute value '{1}' in element '{2}' is not in the range of ...
- Reflections with suspiciously long delay. If the room is very large, this is normal. Otherwise, calibration results may be ...
- Refresh rate in hertz. If a range of rates is supported, use the MinRefreshRate and MaxRefreshRate properties, and set RefreshRate ...
- Refresh the settings for the Remote Desktop Virtualization Servers node, including the list of RD Virtualization Host servers ...
- Refreshes the properties of the object with with the values stored in the directory service (for public queues) or the local ...
- Refreshes the state of all disks in the selected pack, attempts recovery on disks in the invalid pack, and, resynchronizes ...
- Refreshes the state of all disks in the selected pack. Attempts recovery on disks in the invalid pack, and resynchronizes ...
- Refreshing connection details automatically on a frequent basis can impact server performance. To maximize server performance, ...
- REG ADD KeyName /v ValueName | /ve /t Type /s Separator /d Data /f KeyName \Machine\]FullKey Machine Name of remote machine ...
- REG COMPARE KeyName1 KeyName2 /v ValueName | /ve Output /s KeyName \Machine\]FullKey Machine Name of remote machine - omitting ...
- REG COPY KeyName1 KeyName2 /s /f KeyName \Machine\]FullKey Machine Name of remote machine - omitting defaults to the current ...
- REG DELETE KeyName /v ValueName | /ve | /va /f KeyName \Machine\]FullKey Machine Name of remote machine - omitting defaults ...
- REG EXPORT KeyName FileName /y Keyname ROOTKEY[\SubKey (local machine only). ROOTKEY HKLM | HKCU | HKCR | HKU | HKCC SubKey ...
- REG FLAGS KeyName QUERY | SET DONT_VIRTUALIZE DONT_SILENT_FAIL RECURSE_FLAG Keyname "HKLM\Software"[\SubKey (Restricted to ...
- REG IMPORT FileName FileName The name of the disk file to import (local machine only). Examples: REG IMPORT AppBkUp.reg Imports ...
- REG LOAD KeyName FileName KeyName ROOTKEY\SubKey (local machine only) ROOTKEY HKLM | HKU SubKey The key name to load the ...
- REG Operation Parameter List Operation QUERY | ADD | DELETE | COPY | SAVE | LOAD | UNLOAD | RESTORE | COMPARE | EXPORT | ...
- REG QUERY KeyName /v ValueName | /ve /s /f Data /k /d /c /e /t Type /z /se Separator KeyName \Machine\]FullKey Machine - ...
- REG RESTORE KeyName FileName KeyName ROOTKEY\SubKey (local machine only) ROOTKEY HKLM | HKCU | HKCR | HKU | HKCC SubKey The ...
- REG SAVE KeyName FileName /y KeyName ROOTKEY\SubKey ROOTKEY HKLM | HKCU | HKCR | HKU | HKCC SubKey The full name of a registry ...
- REG UNLOAD KeyName KeyName ROOTKEY\SubKey (local machine only) ROOTKEY HKLM | HKU SubKey The key name of the hive to unload. ...
- Register application as a protocol handler. The command line takes a series of 3 values, multiple Clients may be seperated ...
- Registered type library information is invalid. The library GUID, version, locale, or platform information may be corrupt. ...
- Registers and updates IP addresses and DNS records for this computer. If this service is stopped, this computer will not ...
- Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported ...
- Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported ...
- Registration of this component failed. This component resides in a file which lacks self-registration code but for which ...
- Registry Editor could not retrieve the security information. The key currently selected does not give you access to retrieve ...
- Registry Editor could not save the security information. The key currently selected does not give you access to save such ...
- Registry Editor could not set security in all subkeys. The key currently selected contains one or more inaccessible subkeys. ...
- Registry Editor could not set security in all subkeys. The key currently selected contains one or more subkeys marked for ...
- Registry Editor could not set security in the key currently selected, or some of its subkeys. These keys do not give you ...
- Registry File Failure} The registry cannot load the hive (file): %hs or its log or alternate. It is corrupt, absent, or not ...
- Registry Hive Recovered} Registry hive (file): %hs was corrupted and it has been recovered. Some data might have been lost. ...
- Registry Hive Recovered} Registry hive (file): '%3' was corrupted and it has been recovered. Some data might have been lost. ...
- Registry key is under the HKEY_CURRENT_USER hive, Theoretically, if this is false, the class instance should be stored in ...
- Registry policy allows an administrator to configure registry settings of any type. This policy differs significantly from ...
- Registry Quota In Use is the percentage of the Total Registry Quota Allowed that is currently being used by the system. This ...
- Registry Recovery} One of the files containing the system's Registry data had to be recovered by use of a log or alternate ...
- Registry security settings Allows an administrator to define access permissions (on discretionary access control lists (DACLs)) ...
- Registry This policy setting allows you to audit attempts to access registry objects. A security audit event is generated ...
- RegNotifyChangeKeyValue failed with a return code of %1. Initialization will continue, but registry changes will not be updated ...
- Rehosts all the read-only partitions on a Global Catalog. This command disables connection translation, enables strict replication ...
- Reinstalls agreement TS Licensing key packAgreementType is an enumeration of the following values:SELECT=0, ENTERPRISE=1, ...
- Reinstalls open TS Licensing key packProductVersion is an enumeration of the following values:Windows 2000 Server=0,Windows ...
- Reject (This client is on the affinity list of another cluster node although this node owns handling traffic from the client) ...
- Reject (This cluster node does not own handling traffic from this client and this client is not on the affinity list of this ...
- Reject (While the extended affinity list is in the current transition state, connections from this client will not be handled) ...
- Relative URI '%1' cannot be resolved using an empty base URI node-set as the second parameter to the document() function. ...