Windows Server 2003

  1. This implementation also provides for components to be dynamically updated. The newest components can be downloaded from ...
  2. This indicates how the language was matched to the system: 1 = the application language matched the system language, 2 = ...
  3. This indicates that a notify change request has been completed due to closing the handle which made the notify change request. ...
  4. This indicates that a notify change request is being completed and that the information is not being returned in the caller's ...
  5. This informational level status indicates that a specified registry sub-tree transaction state did not yet exist and had ...
  6. This installation of Connection Manager Administration Kit did not complete, is missing files, or the file permissions are ...
  7. This installation of IIS requires a Windows Build Greater than %s. Setup will continue but the installation may not function. ...
  8. This installation package cannot be installed by the Windows Installer service. You must install a Windows service pack that ...
  9. This installation package could not be opened. Contact the application vendor to verify that this is a valid Windows Installer ...
  10. This installation package could not be opened. Verify that the package exists and that you can access it, or contact the ...
  11. This installation package is not supported by this processor type. For more information, see setup.htm, which is located ...
  12. This instance of MSDE is already installed on this computer. You must install another instance of MSDE or install Microsoft ...
  13. This is a bogus page inserted into the wizard to allow navigation of the full set of pages. To skip over Device Selection, ...
  14. This is a high-speed connection using either a cable modem, DSL or LAN connection. It is always active, and doesn't require ...
  15. This is a high-speed connection using either a DSL or cable modem. Your ISP may refer to this type of connection as PPPoE. ...
  16. This is a license purchased in preset quantities through a retail store or other reseller. The package may be labeled "Microsoft ...
  17. This is a Password Hash Access Audit event. The parameters above are in the following order: User's name whose password hash ...
  18. This is a root certificate. Deleting this certificate will invalidate this CA. Are you certain you wish to delete this certificate? ...
  19. This is a share-level server. You can only set permissions and auditing information on Windows NT File System (NTFS) volumes ...
  20. This is a special version of %s for the %s. This version supports up to 5 concurrent users for testing and development purposes. ...
  21. This is a special version of %s for the BackOffice Test Platform. This version supports up to 5 concurrent users for testing ...
  22. This is an identifier for this software element and is designed to be used in conjunction with other keys to create a unique ...
  23. This is an illegal port name. A port name must start with a letter or number, and cannot contain any of the following characters: ...
  24. This is done using your Windows NT username and password. If your NetWare password is different, you will be asked to enter ...
  25. This is not a valid DVD volume, or it can not be found. you must select a valid DVD volume for DVD Player, otherwise it will ...
  26. This is the active partition on this disk. All data on the partition will be lost. Are you sure you want to delete this partition? ...
  27. This is the active partition on this disk. All data on the partition will be lost. Are you sure you want to format this partition? ...
  28. This is the DeviceID value found in Win32_NetworkAdapter of theLAN Adapter to be set. The value 0 implies All LAN Adapters. ...
  29. This is the last domain controller of the domain, and the domain is a child of another domain. Specify the name and password ...
  30. This is the member's primary group, so the member cannot be removed. Go to the Member Of tab of the member's property sheet ...
  31. This is the name that users of earlier versions of Windows will use to identify the new domain. Click Next to accept the ...
  32. This is the number of times that a wait for an available send buffer was done by the protocol on the server side of the connection. ...
  33. This is the only scope in the superscope. Removing it from the superscope will remove the superscope as well. Continue? Note, ...
  34. This is the recommended method. The license server will automatically exchange the needed information with the Microsoft ...
  35. This is the replication status for the following directory partition on the local domain controller. Directory partition: ...
  36. This is the replication status for the following directory partition on the local domain controller. Directory partition: ...
  37. This is the replication status for the following directory partition on the local domain controller. Directory partition: ...
  38. This is the screen where you decide whether a user name and password will be required to access the Internet from this computer. ...
  39. This is the screen where you identify yourself by first and last name so that Windows will recognize you when you're logged ...
  40. This is the screen where you set up your account with an Internet service provider, or \"ISP\" for short, so that you can ...
  41. This is the screen where you type your 25-character product key that should have been provided by your computer manufacturer. ...
  42. This is the Unicode version of DxDiag, which only runs on Windows NT. Please use the non-Unicode version of DxDiag on Windows ...
  43. This is the URL that will be passed to the Description area in the Event Properties dialog box. Change this value if you ...
  44. This is the value for Description found in Win32_NetworkAdapterConfiguration of theLAN Adapter to be set. The value 0 implies ...
  45. This is usually a temporary error during hostname resolution and means that the local server did not receive a response from ...
  46. This is your last chance to change the region setting on your DVD drive. Are you absolutely sure you want to proceed? If ...
  47. This item does not exist in the configuration of the machine you are using to configure this policy. If this item does not ...
  48. This item was created by a .NET Passport website. It is a special type that cannot be viewed or changed here. From this program, ...
  49. This item was created by Dial-up Networking and cannot be edited here. From this program, it may only be deleted. To edit ...
  50. This key storage device is full and the new key "%1" could not be added. Go back and pick an existing key, or use a different ...
  51. This LDAP server no longer automatically covers site '%1' for non-domain NC '%2'. However, site '%1' is still (manually) ...
  52. This list displays only groups from the current domain and groups maintained in the Global Catalog, such as universal groups. ...
  53. This list shows the Web sites that provide content to the current page and their cookie status. Double-click an item in the ...
  54. This logon information will be used when you connect to the specified server. If you logged on to Windows with a domain account ...
  55. This LPT port name is being used by another device (such as another LPT port). Using duplicate names can lead to inaccessible ...
  56. This machine is running Terminal Services in Application Server Mode. Applications are not available to install from the ...
  57. This may be caused by allowing dsadd to auto-generate the downlevel computer name. Try specifying the -samid switch with ...
  58. This may be caused by allowing dsadd to auto-generate the downlevel group name. Try specifying the -samid switch with a value. ...
  59. This message contains some text having a character set other than the default character set. When sending this message you ...
  60. This message has been digitally signed and encrypted by the sender. Signed e-mail from others allows you to verify the authenticity ...
  61. This message has been digitally signed by the sender. Signed e-mail from others allows you to verify the authenticity of ...
  62. This message has been encrypted by the sender. When you receive an encrypted e-mail message you can be reasonably confident ...
  63. This message includes a security label which defines the security level of the message. Outlook Express was unable to verify ...
  64. This message is being sent with %1!u! bit encryption. Your Advanced Security options are set to warn on less than %2!u! bit ...
  65. This message is digitally signed.|This message is encrypted.|This message is digitally signed, but there is a problem with ...
  66. This Message Queuing Cluster Resource provides a communications infrastructure for distributed, asynchronous messaging applications. ...
  67. This method causes the NLB driver to load with all the values that are set in ALL of the the setting classes, including the ...
  68. This method causes the NLB driver to load with all the values that are set in ALL of the the setting classes, including the ...
  69. This method gets/sets the following instance-specific/global NLB registry parameters. UnicastInterHostCommSupport; Instance-Specific; ...
  70. This method invokes the chkdsk operation on the disk. The method is applicable to only those instances of logical disk that ...
  71. This method invokes the chkdsk operation on the volume. The method is applicable to only those volume instances that represent ...
  72. This method is a scriptable equivalent to setting the proxy manually through Internet Options (Control Panel) or Internet ...
  73. This method is used exclude disks from the chkdsk operation to be run at the next reboot. If not excluded, chkdsk is performed ...
  74. This method is used schedule chkdsk to be run at the next reboot if the dirty bit has been set. The method is applicable ...
  75. This method is used schedule chkdsk to be run at the next reboot if the dirty bit has been set.The method is applicable to ...