Windows Server 2003

  1. This advertises Internet Packet Exchange (IPX) network services to clients and servers on the network. If this service is ...
  2. This analysis is a comparison of the selected server's configuration to the selected security policy at the given date and ...
  3. This application can cause severe problems during the upgrade to Windows XP. Because of this, you must uninstall ControlIt ...
  4. This application has failed to start because the application configuration is incorrect. Reinstalling the application may ...
  5. This application requires Windows 95 or later or Windows NT 4.00 or later. Earlier versions of Windows NT cannot be directly ...
  6. This area has virtual interfaces and cannot be a stub area. Remove any virtual interfaces which use this area as a transit ...
  7. This association relates a CIM_Configuration object to one or more managed system elements. The CIM_Configuration object ...
  8. This association relates a CIM_Configuration object to one or more managed system elements. The CIM_Configuration object ...
  9. This association relates a MSI Check with any locational information it requires. The location is in the form of a file and/or ...
  10. This association relates an MSI action with any locational information it requires. This location is in the form of a file ...
  11. This auditing entry is inherited from the %1 and controls access to this object. To stop inheriting auditing entries, clear ...
  12. This auditing entry is inherited from the %1 but does not control access to this object. It may control access to child objects ...
  13. This auditing entry is inherited from the parent object and controls access to this object. To stop inheriting auditing entries, ...
  14. This auditing entry is inherited from the parent object but does not control access to this object. It may control access ...
  15. This automatic configuration feature is not supported by your Internet service provider. Click Next to manually configure ...
  16. This backup job cannot be scheduled for later execution because the Task Scheduler interface is not present or is not started. ...
  17. This Briefcase database is corrupt. The files in the Briefcase are okay, but they are no longer in a sync relationship with ...
  18. This CA Root certificate is not trusted. To enable trust, install this certificate in the Trusted Root Certification Authorities ...
  19. This calling card is missing some required information. To use this card, click Edit to provide more information, or select ...
  20. This candidate node does not have the same operating system version as the candidate node "%1!ws!". Cancel one of these nodes ...
  21. This CD contains a newer version of Windows than the one you are presently using. Do you want to upgrade to a newer version ...
  22. This CD does not have enough free space for all your files. There is %1 free space on the disc, and %2 to be written. To ...
  23. This CD is from an older version of Windows than the one you are presently using. Setup functionality from this disk will ...
  24. This certificate already exists in the certificate store you selected. Do you want to overwrite the existing certificate? ...
  25. This certificate cannot be renewed because it does not contain enough information to generate a renewal request. Please request ...
  26. This certificate cannot be used to verify the authenticity of downloaded software because it does not have the appropriate ...
  27. This certificate has been validated on your computer. The remote computer was not used to verify this certificate. To ensure ...
  28. This Certificate is currently configured for SSL use in %1 virtual directories in this site. Are you sure you want to remove ...
  29. This certificate is not valid because one of the certification authorities in the certification path does not appear to be ...
  30. This certificate template uses CSPs that do not support the minimum key length you chose. Requests will use any CSP available ...
  31. This certificate trust list cannot be verified. The certificate that countersigned this CTL is not available for verification. ...
  32. This certificate trust list is not valid. The countersignature cannot be verified and the CTL may have been tampered with. ...
  33. This certificate validates to a root certificate that appears to be trusted by the remote computer. To ensure this certificate ...
  34. This certificate will be used in the Per Device or Per User licensing mode. Therefore, it will instead be installed on the ...
  35. This certification authority does not appear to be allowed to issue certificates or cannot be used as an end-entity certificate. ...
  36. This change will not take effect until you close down and restart the Address Book (as well as any other applications currently ...
  37. This channel includes content for display by the Channel Screen Saver. Would you like to replace your current screen saver ...
  38. This channel is password-protected. You will not be able to synchronize this channel without a username and password. If ...
  39. This channel is password-protected. You will not be able to update a subscription to this channel without a username and ...
  40. This channel is unavailable or you are not connected to the Internet. You must be connected to the Internet to add an Active ...
  41. This channel requires a user name and password before you can download its content. You should have received this information ...
  42. This chat session is now open. Others can join this session by running DxDiag on another computer, choosing "Test DirectPlay", ...
  43. This check did not verify the integrity of the images on the server. It also did not check the screen files, since these ...
  44. This check is done only on your computer to ensure the privacy and security of your data, and does not send any information ...
  45. This checkbox only applies when you are connected to a local network and a dial-up network simultaneously. When checked, ...
  46. This class contains the .INI information that the application needs to set in an .INI file. The .INI file information is ...
  47. This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
  48. This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
  49. This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
  50. This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
  51. This class represents a rule for how TCP/IP traffic is handled. The provider will only return the instances for this class ...
  52. This class represents a rule for how TCP/IP traffic is handled. The provider will only return the instances for this class ...
  53. This class represents an association between a managed system element collection and the class representing statistical information ...
  54. This class represents the association between an operating system and the autochk settings that apply to the disks on the ...
  55. This class represents the directory layout for the product. Each instance of the class represents a directory in both the ...
  56. This class represents the settings for the autochk operation for a disk. The setting applies to all disks on the computer ...
  57. This class specifies information needed to check a particular setting file for a specific entry that contains a value that ...
  58. This class specifies the information to be used to modify a particular setting file for a specific entry with a specific ...
  59. This class supplies additional information about a data provider. Querying this class with an instance name returned from ...
  60. This client role is not needed to browse the web. This client role is also not needed if Microsoft Office is installed on ...
  61. This cluster resource will be managed by the name you specify below. You can also provide a description. Only administrators ...
  62. This column is a list of names of services or load ordering groups that the system must start before this service. Names ...
  63. This column specifies the action taken by the startup program if the service fails to start during startup. One of the following ...
  64. This COM name is being used by another device (such as another com port or modem). Using duplicate names can lead to inaccessible ...
  65. This component did not download correctly because the data is not digitally signed, and therefore cannot be verified as trusted. ...
  66. This computer connects directly to the Internet. The other computers on my network connect to the Internet through this computer. ...
  67. This computer connects to the Internet directly or through a network hub. Other computers on my network also connect to the ...
  68. This computer contains information that will allow you to uninstall this version of Windows and return to a previous version. ...
  69. This computer could not authenticate with %2, a Windows domain controller for domain %1, and therefore this computer might ...
  70. This computer does not have enough memory to run Windows. This version requires %1!u!.%2!02u! megabytes (MB) of memory (RAM). ...
  71. This computer does not have the necessary domain permissions to support the security functions relating to the created subscription ...
  72. This computer has at least one dynamically assigned IP address. For reliable %1 operation, you should use only static IP ...
  73. This computer has been configured to run Terminal Server. The Terminal Server component allows multiple users to connect ...
  74. This computer has failed to issue Windows 2000 and Windows 2003 Per Device Client Access License to one or more Windows Server ...
  75. This computer has failed to issue Windows 2000 Per Seat Client Access License to one or more Windows Server 2000 Terminal ...