Windows 7

  1. Recovery console: Allow automatic administrative logon This security setting determines if the password for the Administrator ...
  2. Recovery console: Allow floppy copy and access to all drives and all folders Enabling this security option makes the Recovery ...
  3. Recovery could only locate up to log file: %4 (generation %5) before detecting an out of sequence logs, and could not locate ...
  4. Recovery of %1 to %2 failed. Error %3 Total size to recover: %4 Total size recovered: %5 Total files recovered: %6!I64d! ...
  5. Recovery of %1 to %2 successfully completed. Total bytes recovered: %3 Total files recovered: %4!I64d! Total files failed: ...
  6. Recovery of data protection master key was attempted. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ...
  7. Recovery of data protection master key. Key Identifier: %1 Recovery Reason: %3 Recovery Server: %2 Recovery Key ID: %4 Failure ...
  8. Recovery of individual files, folders, application data, or system state data from DVD or removable media is not supported. ...
  9. Recovery of the application to the original location is not allowed because the application is not registered with Windows ...
  10. Recreating the Windows Media Player media library might allow you to see your music and videos. You might need to recreate ...
  11. Recursion: - Query: Queries Recursed = %1!10lu! Original Questions = %2!10lu! Additional Question = %3!10lu! Total Questions ...
  12. Recycles the specified application pool, recycling its the worker processes. The exact application pool identifier must be ...
  13. Redeploying this application will reinstall the application everywhere it is already installed. Do you want to continue? ...
  14. Redirect files from one directory to another. This shim accepts a list of directories to redirect, a list of directories ...
  15. Redirect messages are sent to indicate that the node which the packet was sent to is no longer the best gateway to reach ...
  16. Redirect registry keys from one branch to another. This shim accepts a list of branches to redirect, a list of branches to ...
  17. Redirected access adjusts the access mode to enable disk maintenance operations that do not require the services and applications ...
  18. Redirected access is not the normal access mode for Cluster Shared Volumes and should only be used for certain maintenance ...
  19. Redirected files are files that are available in other locations, such as another location on your computer, another drive ...
  20. Redirection Options is configured by adding the following flags None(0), Drives(1), Printers(2), Clipboard(4), Plug and Play(8), ...
  21. Reduce interference by moving your computer Possible sources of interference include microwave ovens, cordless phones, and ...
  22. Reduces the size of the volume with focus by the specified amount. Makes free disk space available from unused space at the ...
  23. RedundancyStatus provides information on the state of the redundancy group. \"Fully Redundant\" (value=2) means that all ...
  24. Redundant Read} To satisfy a read request, the NT fault-tolerant file system successfully read the requested data from a ...
  25. Redundant Write} To satisfy a write request, the NT fault-tolerant file system successfully wrote a redundant copy of the ...
  26. Refer to Windows Help and Support for more information about wireless connectivity problems Windows cannot resolve your wireless ...
  27. Reference scope constraint '{0}' has been violated: the uri attribute value '{1}' in element '{2}' is not in the range of ...
  28. Reflections with suspiciously long delay. If the room is very large, this is normal. Otherwise, calibration results may be ...
  29. Refresh rate in hertz. If a range of rates is supported, use the MinRefreshRate and MaxRefreshRate properties, and set RefreshRate ...
  30. Refresh the settings for the Remote Desktop Virtualization Servers node, including the list of RD Virtualization Host servers ...
  31. Refreshes the properties of the object with with the values stored in the directory service (for public queues) or the local ...
  32. Refreshes the state of all disks in the selected pack, attempts recovery on disks in the invalid pack, and, resynchronizes ...
  33. Refreshes the state of all disks in the selected pack. Attempts recovery on disks in the invalid pack, and resynchronizes ...
  34. Refreshing connection details automatically on a frequent basis can impact server performance. To maximize server performance, ...
  35. REG ADD KeyName /v ValueName | /ve /t Type /s Separator /d Data /f KeyName \Machine\]FullKey Machine Name of remote machine ...
  36. REG COMPARE KeyName1 KeyName2 /v ValueName | /ve Output /s KeyName \Machine\]FullKey Machine Name of remote machine - omitting ...
  37. REG COPY KeyName1 KeyName2 /s /f KeyName \Machine\]FullKey Machine Name of remote machine - omitting defaults to the current ...
  38. REG DELETE KeyName /v ValueName | /ve | /va /f KeyName \Machine\]FullKey Machine Name of remote machine - omitting defaults ...
  39. REG EXPORT KeyName FileName /y Keyname ROOTKEY[\SubKey (local machine only). ROOTKEY HKLM | HKCU | HKCR | HKU | HKCC SubKey ...
  40. REG FLAGS KeyName QUERY | SET DONT_VIRTUALIZE DONT_SILENT_FAIL RECURSE_FLAG Keyname "HKLM\Software"[\SubKey (Restricted to ...
  41. REG IMPORT FileName FileName The name of the disk file to import (local machine only). Examples: REG IMPORT AppBkUp.reg Imports ...
  42. REG LOAD KeyName FileName KeyName ROOTKEY\SubKey (local machine only) ROOTKEY HKLM | HKU SubKey The key name to load the ...
  43. REG Operation Parameter List Operation QUERY | ADD | DELETE | COPY | SAVE | LOAD | UNLOAD | RESTORE | COMPARE | EXPORT | ...
  44. REG QUERY KeyName /v ValueName | /ve /s /f Data /k /d /c /e /t Type /z /se Separator KeyName \Machine\]FullKey Machine - ...
  45. REG RESTORE KeyName FileName KeyName ROOTKEY\SubKey (local machine only) ROOTKEY HKLM | HKCU | HKCR | HKU | HKCC SubKey The ...
  46. REG SAVE KeyName FileName /y KeyName ROOTKEY\SubKey ROOTKEY HKLM | HKCU | HKCR | HKU | HKCC SubKey The full name of a registry ...
  47. REG UNLOAD KeyName KeyName ROOTKEY\SubKey (local machine only) ROOTKEY HKLM | HKU SubKey The key name of the hive to unload. ...
  48. Register application as a protocol handler. The command line takes a series of 3 values, multiple Clients may be seperated ...
  49. Registered type library information is invalid. The library GUID, version, locale, or platform information may be corrupt. ...
  50. Registers and updates IP addresses and DNS records for this computer. If this service is stopped, this computer will not ...
  51. Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported ...
  52. Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported ...
  53. Registration of this component failed. This component resides in a file which lacks self-registration code but for which ...
  54. Registry Editor could not retrieve the security information. The key currently selected does not give you access to retrieve ...
  55. Registry Editor could not save the security information. The key currently selected does not give you access to save such ...
  56. Registry Editor could not set security in all subkeys. The key currently selected contains one or more inaccessible subkeys. ...
  57. Registry Editor could not set security in all subkeys. The key currently selected contains one or more subkeys marked for ...
  58. Registry Editor could not set security in the key currently selected, or some of its subkeys. These keys do not give you ...
  59. Registry File Failure} The registry cannot load the hive (file): %hs or its log or alternate. It is corrupt, absent, or not ...
  60. Registry Hive Recovered} Registry hive (file): %hs was corrupted and it has been recovered. Some data might have been lost. ...
  61. Registry Hive Recovered} Registry hive (file): '%3' was corrupted and it has been recovered. Some data might have been lost. ...
  62. Registry key is under the HKEY_CURRENT_USER hive, Theoretically, if this is false, the class instance should be stored in ...
  63. Registry policy allows an administrator to configure registry settings of any type. This policy differs significantly from ...
  64. Registry Quota In Use is the percentage of the Total Registry Quota Allowed that is currently being used by the system. This ...
  65. Registry Recovery} One of the files containing the system's Registry data had to be recovered by use of a log or alternate ...
  66. Registry security settings Allows an administrator to define access permissions (on discretionary access control lists (DACLs)) ...
  67. Registry This policy setting allows you to audit attempts to access registry objects. A security audit event is generated ...
  68. RegNotifyChangeKeyValue failed with a return code of %1. Initialization will continue, but registry changes will not be updated ...
  69. Rehosts all the read-only partitions on a Global Catalog. This command disables connection translation, enables strict replication ...
  70. Reinstalls agreement TS Licensing key packAgreementType is an enumeration of the following values:SELECT=0, ENTERPRISE=1, ...
  71. Reinstalls open TS Licensing key packProductVersion is an enumeration of the following values:Windows 2000 Server=0,Windows ...
  72. Reject (This client is on the affinity list of another cluster node although this node owns handling traffic from the client) ...
  73. Reject (This cluster node does not own handling traffic from this client and this client is not on the affinity list of this ...
  74. Reject (While the extended affinity list is in the current transition state, connections from this client will not be handled) ...
  75. Relative URI '%1' cannot be resolved using an empty base URI node-set as the second parameter to the document() function. ...