Windows 8

  1. Setup was unable to detect your Extender on the network. The following program on this computer might prevent your Extender ...
  2. Setup was unable to determine whether Microsoft iSCSI Software Target or Microsoft iSCSI Software VDS/VSS providers are installed ...
  3. Setup was unable to find your Extender on the network. This issue might be caused by a configuration problem with your network, ...
  4. Setup was unable to install or update the default certificate templates. Ensure you have write permissions on the "Certificate ...
  5. Setup will attempt to turn on NX during installation. If your processor doesn't support NX, the installation will be cancelled ...
  6. SetUpdateInformation requires that you specify a WriteActivationMode or ReadActivationMode. These modes determine when the ...
  7. Several items from the following location have failed to play: %s Do you want to remove all items in that location from the ...
  8. Several items from the following location have failed to play: %s Do you want to remove files that cannot be found in that ...
  9. Several navigation nodes that define the scope of this view are no longer available. Adjust the scope of this view before ...
  10. Severity=Info DHCPV6 Relay Agent has discarded a packet received on the local interface with IP address %1. The packet had ...
  11. Severity=Warning DHCPV6R has discarded a packet received on the local interface with IP address %1. The packet had a hop-count ...
  12. Shadow copies allow users to view the contents of shared folders as the contents existed at previous points in time. For ...
  13. Shadow Copies of Shared Folders provides point-in-time copies of files that are located on shared resources, such as a file ...
  14. Shadow copy "%1" was deleted during storage report generation. Volume "%2" might be configured with inadequate shadow copy ...
  15. Shadow copy '%1' was deleted during storage report generation. Volume '%2' might be configured with inadequate shadow copy ...
  16. Shadow copy context and options cannot be changed at this point. Use RESET to reset DiskShadow to its original state, or ...
  17. Shadow copy creation failed for volume "%1" after retrying for %2 minutes because other shadow copies were being created. ...
  18. Shadow copy creation failed for volume "%1" with error %2. The volume might be configured with inadequate shadow copy storage ...
  19. Shadow copy creation failed for volume '%1' with error %2. The volume might be configured with inadequate shadow copy storage ...
  20. Shadow Copy ID: %1 Original Volume: (%2)%3 Shadow Copy Volume: %4 Originating Machine: %5 Service Machine: %6 Provider: '%7' ...
  21. Shadow Copy Storage association For volume: (%1)%2 Shadow Copy Storage volume: (%3)%4 Used Shadow Copy Storage space: %5 ...
  22. Share name that you entered may not be accessible from some MS-DOS workstations. Are you sure you want to use this share ...
  23. Share permissions provide a level of access control for a shared folder. NTFS permissions control local access to files and ...
  24. Share {0} for folder {1} only has unresolved local users or groups. The application was unable to delete the share, so the ...
  25. Shared data cannot be updated because selection data was not updated on selection change. The snap-in might not be calling ...
  26. Shared files are files that other people in your home or office have access to. They might include documents, photos, music, ...
  27. Shared secret between the Remote Access server and the specified external RADIUS server which is required for successful ...
  28. Shared secret between the Remote Access server and the specified external RADIUS server which is required for successful ...
  29. Shared secret between the Remote Access server and the specified external RADIUS server which is required for successful ...
  30. Shared secret between the VPN server and the specified external RADIUS server. Note that the secret is specified in clear ...
  31. Shared storage must be specified in a clustered environment. Specify a Cluster Shared Volume or shared folder and retry the ...
  32. Sharing is authorized because your firewall has been turned off. If you are concerned about privacy on this network, turn ...
  33. Shim which intercepts the ShowWindow API call and fixes the problem due to tabbed browsing architecture changes in IE. The ...
  34. Short file names (8 characters with 3-character extensions) are required for some 16-bit applications running on client computers, ...
  35. Shortcuts policy allows an administrator to manage shortcuts of any type that can be configured manually on a computer, including ...
  36. should be in the following forms: group@domain or domain\group user@domain or domain\user FQDN of the user or group A string ...
  37. Should the public and private key pair, and the certificate be exported to a password protected PFX file and the private ...
  38. show dscp type=]ipsecauthenticated|ipsecunauthenticated|icmpv6|filtered|default Displays IPsec DoS Protection DSCP marking ...
  39. show interface type=]public|internal Displays IPsec DoS Protection interface configuration. Parameters: Tag Value type - ...
  40. show ratelimit type=]ipsecauthenticated|ipsecunauthenticated|ipsecunauthenticatedperip| icmpv6|filtered|default Displays ...
  41. show state publicprefix= / internalprefix= / Displays all state entries inside IPsec DoS Protection that match specified ...
  42. ShowCursor will display the cursor if the count is >= 0, this shim will force ShowCursor to act as a toggle rather than a ...
  43. SHOWISM can very useful for locating improperly configured sites. This operation cannot be executed remotely. As the KCC ...
  44. Shows the current SSTP Certificate configuration Friendly name - Certificate Friendly name Display name - Display Friendly ...
  45. Shows the idle timeout and network outage time values for IKEv2 client connections. idletimeout - Shows the idle timeout ...
  46. Shows the IKEv2 Security Association's expiration controls. saexpirytime - Shows the SA expiry value in minutes for IKEv2 ...
  47. Shows the mobility support of IKEv2 based remote access clients. ENABLED - Support mobility of remote access clients DISABLED ...
  48. Shuffling refreshes the music on your device by replacing the existing music files with new ones. Do you want to continue? ...
  49. Shut down the system This security setting determines which users who are logged on locally to the computer can shut down ...
  50. Shut down the virtual machine and convert the chain of VHD-format differencing virtual hard disks to the VHDX format or merge ...
  51. Shut down the virtual machine and convert the VHD-format dynamic virtual hard disk to a VHDX-format virtual hard disk or ...
  52. Shut down the virtual machine and use Hyper-V Manager to remove the SCSI controller from the virtual machine. Then, restart ...
  53. Shutdown: Allow system to be shut down without having to log on This security setting determines whether a computer can be ...
  54. Shutdown: Clear virtual memory pagefile This security setting determines whether the virtual memory pagefile is cleared when ...
  55. SID filtering is enabled for this trust. Only SIDs from the trusted domain will be accepted for authorization data returned ...
  56. SID filtering is not enabled for this trust. All SIDs presented in an authentication request from this domain will be honored. ...
  57. SID History was added to an account. Subject: Security ID: %6 Account Name: %7 Account Domain: %8 Logon ID: %9 Target Account: ...
  58. SIDs were filtered. Target Account: Security ID: %1 Account Name: %2 Account Domain: %3 Trust Information: Trust Direction: ...
  59. Signal strength from "%ws" is low This could be caused by the computer being too far away from the wireless router or access ...
  60. Signals Windows when an application is attempting to listen on an interface and has opted in for edge traversing traffic. ...
  61. Signature (SIG) Cryptographic signature (SIG) record. Authenticates a resource record set of a particular type, class, and ...
  62. Signature validation cannot be performed on modules loaded by COM, so the object will not be created. The object is likely ...
  63. Significant data loss might occur if the virtual machine encounters a problem and a recent backup does not exist. This impacts ...
  64. Signing Certificate is automatically updated by OCSP Responder Service. CA Configuration ID: %1 New Signing Certificate Hash: ...
  65. Signing Certificate was automatically updated by the OCSP Responder Service. CA Configuration ID: %1 New Signing Certificate ...
  66. Simple Network Management Protocol (SNMP) includes agents that monitor the activity in network devices and report to the ...
  67. Simple Network Management Protocol (SNMP) Service includes agents that monitor the activity in network devices and report ...
  68. Simple TCP/IP Services supports the following TCP/IP services: Character Generator, Daytime, Discard, Echo and Quote of the ...
  69. Simulating a failure could cause the clustered role to be moved to another node in the cluster, and this could interrupt ...
  70. Since an MSMQ 1.0 primary site controller owns the queue, you must manually delete the queue from the MSMQ 1.0 site (use ...
  71. Since the SQL instance name does not already exist in the registry and the WID role service is not installed, the instance ...
  72. Since these permissions propagate to all child objects, making this change will require more storage and time to evaluate. ...
  73. Since you have specified the RPC/HTTP proxy echo only option (-E), the endpoint/interface you have specified will be ignored ...
  74. Since your system administrator requires a log to be maintained of all Remote Assistance sessions, Remote Assistance will ...
  75. Single-root I/O virtualization (SR-IOV) requires specific hardware. It also might require drivers to be installed in the ...