Windows Server 2003
- This advertises Internet Packet Exchange (IPX) network services to clients and servers on the network. If this service is ...
- This analysis is a comparison of the selected server's configuration to the selected security policy at the given date and ...
- This application can cause severe problems during the upgrade to Windows XP. Because of this, you must uninstall ControlIt ...
- This application has failed to start because the application configuration is incorrect. Reinstalling the application may ...
- This application requires Windows 95 or later or Windows NT 4.00 or later. Earlier versions of Windows NT cannot be directly ...
- This area has virtual interfaces and cannot be a stub area. Remove any virtual interfaces which use this area as a transit ...
- This association relates a CIM_Configuration object to one or more managed system elements. The CIM_Configuration object ...
- This association relates a CIM_Configuration object to one or more managed system elements. The CIM_Configuration object ...
- This association relates a MSI Check with any locational information it requires. The location is in the form of a file and/or ...
- This association relates an MSI action with any locational information it requires. This location is in the form of a file ...
- This auditing entry is inherited from the %1 and controls access to this object. To stop inheriting auditing entries, clear ...
- This auditing entry is inherited from the %1 but does not control access to this object. It may control access to child objects ...
- This auditing entry is inherited from the parent object and controls access to this object. To stop inheriting auditing entries, ...
- This auditing entry is inherited from the parent object but does not control access to this object. It may control access ...
- This automatic configuration feature is not supported by your Internet service provider. Click Next to manually configure ...
- This backup job cannot be scheduled for later execution because the Task Scheduler interface is not present or is not started. ...
- This Briefcase database is corrupt. The files in the Briefcase are okay, but they are no longer in a sync relationship with ...
- This CA Root certificate is not trusted. To enable trust, install this certificate in the Trusted Root Certification Authorities ...
- This calling card is missing some required information. To use this card, click Edit to provide more information, or select ...
- This candidate node does not have the same operating system version as the candidate node "%1!ws!". Cancel one of these nodes ...
- This CD contains a newer version of Windows than the one you are presently using. Do you want to upgrade to a newer version ...
- This CD does not have enough free space for all your files. There is %1 free space on the disc, and %2 to be written. To ...
- This CD is from an older version of Windows than the one you are presently using. Setup functionality from this disk will ...
- This certificate already exists in the certificate store you selected. Do you want to overwrite the existing certificate? ...
- This certificate cannot be renewed because it does not contain enough information to generate a renewal request. Please request ...
- This certificate cannot be used to verify the authenticity of downloaded software because it does not have the appropriate ...
- This certificate has been validated on your computer. The remote computer was not used to verify this certificate. To ensure ...
- This Certificate is currently configured for SSL use in %1 virtual directories in this site. Are you sure you want to remove ...
- This certificate is not valid because one of the certification authorities in the certification path does not appear to be ...
- This certificate template uses CSPs that do not support the minimum key length you chose. Requests will use any CSP available ...
- This certificate trust list cannot be verified. The certificate that countersigned this CTL is not available for verification. ...
- This certificate trust list is not valid. The countersignature cannot be verified and the CTL may have been tampered with. ...
- This certificate validates to a root certificate that appears to be trusted by the remote computer. To ensure this certificate ...
- This certificate will be used in the Per Device or Per User licensing mode. Therefore, it will instead be installed on the ...
- This certification authority does not appear to be allowed to issue certificates or cannot be used as an end-entity certificate. ...
- This change will not take effect until you close down and restart the Address Book (as well as any other applications currently ...
- This channel includes content for display by the Channel Screen Saver. Would you like to replace your current screen saver ...
- This channel is password-protected. You will not be able to synchronize this channel without a username and password. If ...
- This channel is password-protected. You will not be able to update a subscription to this channel without a username and ...
- This channel is unavailable or you are not connected to the Internet. You must be connected to the Internet to add an Active ...
- This channel requires a user name and password before you can download its content. You should have received this information ...
- This chat session is now open. Others can join this session by running DxDiag on another computer, choosing "Test DirectPlay", ...
- This check did not verify the integrity of the images on the server. It also did not check the screen files, since these ...
- This check is done only on your computer to ensure the privacy and security of your data, and does not send any information ...
- This checkbox only applies when you are connected to a local network and a dial-up network simultaneously. When checked, ...
- This class contains the .INI information that the application needs to set in an .INI file. The .INI file information is ...
- This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
- This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
- This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
- This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
- This class represents a rule for how TCP/IP traffic is handled. The provider will only return the instances for this class ...
- This class represents a rule for how TCP/IP traffic is handled. The provider will only return the instances for this class ...
- This class represents an association between a managed system element collection and the class representing statistical information ...
- This class represents the association between an operating system and the autochk settings that apply to the disks on the ...
- This class represents the directory layout for the product. Each instance of the class represents a directory in both the ...
- This class represents the settings for the autochk operation for a disk. The setting applies to all disks on the computer ...
- This class specifies information needed to check a particular setting file for a specific entry that contains a value that ...
- This class specifies the information to be used to modify a particular setting file for a specific entry with a specific ...
- This class supplies additional information about a data provider. Querying this class with an instance name returned from ...
- This client role is not needed to browse the web. This client role is also not needed if Microsoft Office is installed on ...
- This cluster resource will be managed by the name you specify below. You can also provide a description. Only administrators ...
- This column is a list of names of services or load ordering groups that the system must start before this service. Names ...
- This column specifies the action taken by the startup program if the service fails to start during startup. One of the following ...
- This COM name is being used by another device (such as another com port or modem). Using duplicate names can lead to inaccessible ...
- This component did not download correctly because the data is not digitally signed, and therefore cannot be verified as trusted. ...
- This computer connects directly to the Internet. The other computers on my network connect to the Internet through this computer. ...
- This computer connects to the Internet directly or through a network hub. Other computers on my network also connect to the ...
- This computer contains information that will allow you to uninstall this version of Windows and return to a previous version. ...
- This computer could not authenticate with %2, a Windows domain controller for domain %1, and therefore this computer might ...
- This computer does not have enough memory to run Windows. This version requires %1!u!.%2!02u! megabytes (MB) of memory (RAM). ...
- This computer does not have the necessary domain permissions to support the security functions relating to the created subscription ...
- This computer has at least one dynamically assigned IP address. For reliable %1 operation, you should use only static IP ...
- This computer has been configured to run Terminal Server. The Terminal Server component allows multiple users to connect ...
- This computer has failed to issue Windows 2000 and Windows 2003 Per Device Client Access License to one or more Windows Server ...
- This computer has failed to issue Windows 2000 Per Seat Client Access License to one or more Windows Server 2000 Terminal ...