Windows 7
- Returns or sets the Ink object that is associated with an InkCollector object, an InkOverlay object, or a InkPicture control.This ...
- Returns or sets the length of time, in milliseconds, between the last ink stroke collected and the beginning of text recognition.This ...
- Returns the collection of strokes that are currently selected inside the control.This property returns the collection of ...
- Returns the computer name of the Intersite Topology Generator (ISTG) server for a specified site. SYNTAX /istg DSA_LIST /verbose ...
- Returns the cursor to the start of the collection of queues returned by MSMQQuery.LookupQueue and returns the element at ...
- Returns the globally unique identifier (GUID) for a specified computer, which can be used to create a private format name ...
- Returns the ITransaction interface on the underlying transaction object that is used by the MSMQTransaction object as a Variant ...
- Returns the original destination queue of the message, which is typically used when reading response messages, or messages ...
- REVERT Reverts the volume to a specified shadow copy of it. The shadow copy must be a persistent shadow copy. The operation ...
- Reverting this shadow copy will cause you to permanently lose all changes made to volume %s since the shadow copy was created. ...
- Reverting to the parent configuration will result in the loss of all settings in the local configuration file for this feature. ...
- Reverts the original storage volume to this shadow copy. After Revert is done, the original volume will be identical to this ...
- Review actions taken on potentially unwanted software. To review or monitor software that you've permitted to run on your ...
- Review the Action column for each replicated folder. If a shared folder is needed, click Edit to specify the new shared folder ...
- Review the alert details to see why the software was detected. If you do not like how the software operates or if you do ...
- Review the component and subcomponent definitions. Also, verify list of volumes to be shadow copied and the existing writers ...
- Review the settings that you have chosen. You can go back to change these settings or click Finish to complete this wizard. ...
- Revocation information is signed before it is sent to a client. The Online Responder can select a signing certificate automatically, ...
- Revocation status for a certificate in the chain for CA certificate %3 for %1 could not be verified because a server is currently ...
- Revokes the TS CAL represented by the Win32_TSIssuedLicense object. NOT a static functionRevokableCals returns number of ...
- Right-click the People Near Me icon in the notification area of your taskbar, and then click Exit. To continue using People ...
- Rights policy templates can support clients with different languages. Configure this template's identification information ...
- RIP Global Configuration Information - Logging Level : %1!s! Max Receive Queue Size : %2!d! Max Send Queue Size : %3!d! Min ...
- RIP Interface Configuration Information for %1!s! - State : %2!s! %3!s! Metric : %4!d! Update Mode : %5!s! Accept Mode : ...
- Roaming user profiles across forests are disabled. Windows did not load your roaming profile and is logging you on with a ...
- RODC SpecifiC Local Group Member Added: Member Name: %1 Member ID: %2 Target Account Name: %3 Target Domain: %4 Target Account ...
- RODC Specific Local Group Member Removed: Member Name: %1 Member ID: %2 Target Account Name: %3 Target Domain: %4 Target ...
- Rogue detection has been disabled for this server. The Windows Deployment Services server is authorized as a valid DHCP/PXE ...
- RoleOfNode indicates whether the Cluster nodes are peers (value = 2), connected in a master-slave/primary-secondary relationship ...
- RoleOfNode indicates whether the cluster nodes are peers (value = 3), connected in a master-slave/primary-secondary relationship ...
- Roles or features are currently being added or removed on this computer. Only one user can add or remove roles or features ...
- Rollback has completed successfully. %s has been successfully removed from this system and previous versions of files have ...
- rollback is complete. For your changes to take effect, you must restart Windows. Save your work and exit all programs, and ...
- Rollback needs to purge your dllcache directory in order to ensure that your system remains in a consistent state. This can ...
- Rollercoaster Tycoon - Corkscrew Follies is incompatible with this version of Windows. For more information, contact Hasbro ...
- Rollercoaster Tycoon - Loopy Landscapes has a known compatibility issue with this version of Windows. For an update that ...
- Rolling back to older driver software may reduce the functionality or security of your device. If this doesn't resolve the ...
- Root domain check did not pass because error %1 occurred in function %2.%r%3%rMake sure that the domain that this computer ...
- Root hints resolve queries for zones that do not exist on the local DNS server. They are only used if forwarders are not ...
- Root target can be added only to existing namespaces. To create a new namespace use the command "dfsutil root adddom/addstd". ...
- Rotates, in 90 degree increments, and Flips, horizontally or vertically. RotationAngle - Set the RotationAngle property to ...
- Route Through (RT) Route Through (RT) record. Provides an intermediate-route-through binding for internal hosts that do not ...
- Router Advertisement settings have been changed on the network adapter %1. The current M - Managed Address Configuration ...
- Router Discovery Information for %6!s! - Router Discovery is: %1!s! Minimum Advertisement Interval: %3!-3d! minutes Maximum ...
- Router received a general query from RAS Client(%1) on interface with IP address %2. RAS clients are not supposed to send ...
- Routes from sources at lower ranks are preferred over routes from sources at higher ranks. To change the rank of a selected ...
- Routing and Remote Access assigns addresses automatically and forwards name resolution requests to a DNS server on the Internet. ...
- Routing and Remote Access cannot be installed because of the following error. Please see event log for more information: ...
- Routing and Remote Access cannot verify that the currently configured Remote Access Policy on this server matches the default ...
- Routing and Remote Access cannot verify that the default Remote Access Policy matches the settings for the server. The following ...
- Routing and Remote Access could not repair the authentication and accounting providers settings. To repair the settings, ...
- Routing and Remote Access has created a default connection request policy called Microsoft Routing and Remote Access Service ...
- Routing and Remote Access provides integrated multiprotocol routing, remote access, and virtual private network (VPN) capabilities. ...
- Routing and Remote Access Services provides remote users access to resources on your private network over virtual private ...
- Routing and Remote Access will not work properly until you set up a demand-dial interface, so the Routing and Remote Access ...
- Routing and Remote Access will provide an address to any computer on your network which requests one. These addresses will ...
- Routing assistants are users who have access to the fax server inbox and are responsible for directing faxes to the intended ...
- RPC detected an integrity violation while decrypting an incoming message. Peer Name: %1 Protocol Sequence: %2 Security Error: ...
- RPC detected an integrity violation while decrypting an incoming message. Peer Name: %1 Protocol Sequence: %2 Security Error: ...
- RPC Events This policy setting allows you to audit inbound remote procedure call (RPC) connections. If you configure this ...
- RPC Extended Error Info not available. Use group policy on the local machine at "Computer Configuration/Administrative Templates/System/Remote ...
- RPC Proxy load balancing module (PID: %1) cannot process configuration entry for resource UUID %2: ServerFarm is %3. User ...
- RPC Proxy load balancing module (PID: %1) cannot process registry key %2 as a valid UUID. User Action Verify that the registry ...
- RPC Proxy load balancing module (PID: %1) does not recognize configuration type for key %2. User Action Verify that the registry ...
- rpcinfo -T tcp|udp host program version rpcinfo -T tcp|udp -p host rpcinfo -T tcp|udp -b program version rpcinfo -T tcp|udp ...
- RR Signature (RRSIG) Cryptographic signature (RRSIG) record. Authenticates a resource record set of a particular type, class, ...
- RSASHA1 key size can start from 512 bits with 64 bit increment up to 4096 bits. The public exponent cannot be more than 4096 ...
- RSS Indirection Table Change Calls/sec is the average rate, in incidents per second, at which stack submitted a request to ...
- Rule evaluation or execution failed for the transactional trigger %3 with the ID %4. A rule condition or action parameter ...
- Rules in the Domain Profile apply when connected to the domain of which the computer is a member. Rules in the Standard Profile ...
- Run a file management task. The syntax for this command is: Storrept FileMgmt Run /Task:TASK /Nowait /Task:TASK Run the file ...
- Run a file management task. The syntax for this command is: Storrept FileMgmt Run This command will execute a particular ...
- Run as administrator This option allows you to run this shortcut as an administrator, while protecting your computer from ...
- Run automatic classification. The syntax for this command is: Storrept Classification Run This command will execute all the ...
- Run inf install (with inf dependency). In the example, prnbr002.inf depends on ntprint.inf rundll32 printui.dll, PrintUIEntry ...