Windows 7
- A Windows Security update is needed for Internet Explorer 8 to work correctly. Click OK to download the Windows security ...
- A Windows SideShow-compatible device can display information from gadgets running on your computer. Depending on the gadgets ...
- A winpeshl.ini file is present, but no commands were successfully launched. This could be caused by incorrect formatting ...
- A WINS server enables users to access resources by NetBIOS name instead of requiring them to use IP addresses that are difficult ...
- A WINS thread could not signal the main thread after closing its session. This would be caused by the last thread in WINS ...
- A WMI Query targeting item allows a preference item to be applied to computers or users only if the processing computer evaluates ...
- A word breaker was not found for the given language. Check your current language settings and ensure that search supports ...
- A WorkCentre Pro device was not found at the specified Host Name or IP Address. Confirm that the device is online and verify ...
- A worker process '%2' serving application pool '%1' failed to start a listener channel for protocol '%4' in the allotted ...
- A worker process '%2' serving application pool '%1' failed to stop a listener channel for protocol '%4' in the allotted time. ...
- A worker process '%2' serving application pool '%1' is no longer trusted by the Windows Process Activation Service, based ...
- A worker process with pid '%2' that serves application pool '%1' has been determined to be unhealthy (see previous event ...
- A worker process with process id of '%1' serving application pool '%2' has requested a recycle because it reached its allowed ...
- A worker process with process id of '%1' serving application pool '%2' has requested a recycle because it reached its private ...
- A worker process with process id of '%1' serving application pool '%2' has requested a recycle because it reached its scheduled ...
- A worker process with process id of '%1' serving application pool '%2' has requested a recycle because it reached its virtual ...
- A worker process with process id of '%1' serving application pool '%2' has requested a recycle because the worker process ...
- A worker process with process id of '%1' serving application pool '%2' was shutdown due to inactivity. Application Pool timeout ...
- A worker process with process id of '%1' serving application pool '%2' was shutdown due to inactivity. The system is under ...
- A WPA-Personal password must be one of the following: 8~63 case-sensitive characters 64 characters using digits 0-9 and letters ...
- A WPA2-Personal password must be one of the following: 8~63 case-sensitive characters 64 characters using digits 0-9 and ...
- A writable domain controller cannot be demoted with /RetainDcMetaData:yes. Demote the domain controller without /RetainDcMetaData:yes ...
- A write request was received at the Read Only DC. Failed to generate write referral to a writable DC. Write request received ...
- A write request was received at the Read Only DC. The Read Only DC has generated a referral to writable DC %1. Write request ...
- A write-behind operation has failed to the remote server %2. The data contains the amount requested to write and the amount ...
- A writer did not respond to a GatherWriterStatus call. The writer may either have terminated or it may be stuck. Check the ...
- A WsdlHelpGeneratorInfo value that specifies the Web service Help page (an .aspx file) that is displayed to a browser when ...
- A zone transfer request for the secondary zone %1 was refused by the master DNS server at %2. Check the zone at the master ...
- abort/restart off-line by host bit) - If this bit is set to one, then the device shall abort all off-line data collection ...
- Aborting this type of channel during an accept operation without first aborting the HTTP listener is not supported on this ...
- Absolute physical path "%s" is not allowed in system.webServer/httpErrors section in web.config file. Use relative path instead. ...
- Abusive or vulgar terms only in artistic, medical, educational, sports or news context. Crude words, profanity or mild expletives ...
- Abusive or vulgar terms, profanity, swearing, or mild expletives in any context, although this does not include sexual language, ...
- Accelerators are contextual services that provide quick access to external services from any webpage. Accelerators typically ...
- Accept (This cluster node owns handling traffic from this client and this client is not on the affinity list of another node) ...
- AcceptEx: %1: Process %3, Endpoint %4, Buffer %5, Length %6, Address %9, Accept Endpoint %10, Current Backlog %11, Seq %2, ...
- Access based enumeration filters shared folders visible to a user based on that individual user's access rights, preventing ...
- Access can also be limited by the strength of the encryption. Select this option only if 128-bit encryption is supported ...
- Access denied attempting to launch a DCOM Server using DefaultLaunchPermssion. The server is: %1 The user is %2/%3, SID=%4. ...
- Access denied attempting to launch a DCOM Server using DefaultLaunchPermssion. The server is: %1 The user is %2/%3, SID=%4. ...
- Access denied to Windows Management Instrumentation server on this computer. Have an administrator change your access permissions. ...
- Access denied, you must be an administrator of the remote computer to use this command. Either have your account added to ...
- Access Denied. Administrator permissions are needed for this application. Use an administrator command prompt to run this ...
- Access Denied. Administrator permissions are needed to use the selected options. Use an administrator command prompt to complete ...
- Access Denied. Before opening files in this location, you must first add the web site to your trusted sites list, browse ...
- Access Denied. Before opening files in this location, you must first browse to the web site and select the option to login ...
- Access describes whether the media is readable (value=1), writeable (value=2), or both (value=3). \"Unknown\" (0) and \"Write ...
- Access is denied. Check that the Default Content Access Account in Windows Search Central Administration is correct, or follow ...
- Access is denied. You must be logged on to this computer with an account that has access to the remote computer. Verify that ...
- Access this computer from the network This user right determines which users and groups are allowed to connect to the computer ...
- Access to a cluster file share can be granted/denied only to domain users and groups. Please remove any local users or groups ...
- Access to Active Directory Domain Services cannot be initialized. Please verify your permissions and network connectivity. ...
- Access to intranet sites, Web-based applications that run over a local intranet, and other files on network shares may be ...
- Access to intranet sites, Web-based applications that run over a local intranet, and other files on network shares may be ...
- Access to performance data was denied to %1!s! as attempted from %2!s!. %1!s! is the value from GetUserName(), which is the ...
- Access to registry subkey failed (%1). Please ensure that the registry subkey exists and Network Service has full access ...
- Access to the cluster can be granted/denied only to domain users and groups. Please use the Security tab to remove the local ...
- Access to the Connect to a Network Projector wizard is controlled by your system administrator. For more information, contact ...
- Access to the database is denied. Unless the permissions on the database have been changed, you must have administrative ...
- Access to the WMI interface on Remote Desktop Session Host server %2 was denied. Add the Remote App and Desktop Management ...
- Access to Windows-based file servers requires Windows user and group identities. However, NFS access is based on UNIX-style ...
- Access was denied on domain: (%1), and user information from the domain was not imported. Check the user name and password ...
- Access was denied while saving settings. You must be a member of the Cryptographic Operators security group to change these ...
- Access-based enumeration filters shared folders visible to a user based on the individual user's access rights, preventing ...
- Accessing the domain network over DirectAccess requires that your computer be running Windows Server 2008 R2, Windows 7 Enterprise, ...
- According to Active Directory user account logon hours, the user is not permitted to access the network on this day and time. ...
- According to RADIUS RFC 2865, the format of this attribute is Type (1 byte), Length (1 byte), Vendor ID (4 bytes), String. ...
- According to Windows group policy, you have specified a password with too few characters. Are you sure that you want to use ...
- According to Windows group policy, you have specified a password with too many characters. Are you sure that you want to ...
- Account changes will take effect the next time the 'IPSEC Services' service is started. Do you want to start the 'IPSEC Services' ...
- Account lockout duration This security setting determines the number of minutes a locked-out account remains locked out before ...
- Account Lockout This policy setting allows you to audit events generated by a failed attempt to log on to an account that ...
- Account lockout threshold This security setting determines the number of failed logon attempts that causes a user account ...
- Account Name Changed: Old Account Name: %1 New Account Name: %2 Target Domain: %3 Target Account ID: %4 Caller User Name: ...
- Account policy in GPO %1,if any, was ignored because account policy on domain controllers can only be configured through ...