Windows Server 2003

  1. User Time is the percentage of elapsed time that the process threads spent executing code in user mode. Applications, environment ...
  2. User Time is the percentage of elapsed time that this thread has spent executing code in user mode. Applications, environment ...
  3. User Time is the percentage of elapsed time the processor spends in the user mode. User mode is a restricted processing mode ...
  4. User to be notified upon job completion or failure. This property is restricted to 16 characters under Windows 9x platforms. ...
  5. UserKeyAndCertFile - Data file containing user private keys and certificates to be archived. This can be any of the following: ...
  6. Users are prevented from making accidental or intentional system-wide changes. Thus, Users can run certified applications, ...
  7. Users in the local domain can be authenticated to use all of the resources in the specified domain or only those resources ...
  8. Users in the local forest can be authenticated to use all of the resources in the specified forest or only those resources ...
  9. Users in the specified domain can be authenticated to use all of the resources in the local domain or only those resources ...
  10. Users in the specified forest can be authenticated to use all of the resources in the local forest or only those resources ...
  11. Users trying to reconnect to this share (%1\%2) will need to supply the correct new password to succeed. Failure to do so ...
  12. Users With a Damaged Start Menu or Desktop The Start menu or desktop for the following user accounts is inaccessible or incomplete ...
  13. Users With a Damaged Start Menu or Desktop The Start menu or desktop for the following user accounts is inaccessible or incomplete ...
  14. Users with limited accounts cannot always install programs. Depending on the program, a user might need administrator privileges ...
  15. user`u`user password]`User to Run As. Entering a for the password produces a prompt for the password. The password is not ...
  16. Using a directory service to check the e-mail addresses of your message recipients may slow down the performance of your ...
  17. Using a PIN to encrypt the pre-shared key increases the security of your deployment. Users will need the PIN in order to ...
  18. Using a server-based sign-up method, you can completely control the users sign-up experience via files on the server. The ...
  19. Using automatic certificate requests, an administrator can specify which types of certificate can be automatically requested ...
  20. Using Internet Gateway, you can use this computer to control the Internet connection for your network. To run Internet Gateway ...
  21. Using servers for Internet browsing does not adhere to sound security practices because Internet browsing increases the exposure ...
  22. Using the DISABLE command, you can disable a Windows system service or driver. DISABLE servicename servicename The name of ...
  23. Using the ENABLE command, you can enable a Windows system service or driver. ENABLE servicename start_type servicename The ...
  24. Using the following variables, you can create a format for automatically generating custom computer names for new installations: ...
  25. Using TTL scoping is not recommended. By enabling TTL scoping, you sacrifice bandwidth in your network, since data will be ...
  26. Using your current location and calling card selection, dialing this number could result in a emergency services call to ...
  27. Using |technologies |such |as |the |Microsoft |.NET |Framework, |developers |can |employ |multiple |languages |in |single ...
  28. USN journal for volume %1 cannot be created because the disk is too full. This volume cannot be managed by Remote Storage. ...
  29. Utility Manager cannot start this application on the secure desktop. Contact your system Administrator for sufficient permissions. ...
  30. Utility Manager was produced for Microsoft Corporation by ECO Kommunikation, makers of Braille-, speech-based and other access ...
  31. Vendor ID: %1!s! Qualifier: 2!08x! Version: 3!08x! Global Flags: 4!08x! Num Data Entries: %5!d! File ID: %6!s! Data: Flags: ...
  32. Verification of the trust between the domain %2 and the domain %3 was unsuccessful because: %1 Resetting the trust passwords ...
  33. Verification of the trust between the domain %2 and the domain %3 was unsuccessful because: %1 To repair a trust to a pre-Windows ...
  34. Verification reads the backed-up data to verify its integrity. This step takes extra time, but verification helps ensure ...
  35. verifier /flags FLAGS /iolevel IOLEVEL /all verifier /flags FLAGS /iolevel IOLEVEL /driver NAME NAME . verifier /reset verifier ...
  36. Verifying Disk} The media has changed and a verify operation is in progress so no reads or writes may be performed to the ...
  37. Version overlap with previous version redirection while parsing policy file %1 where oldVersion is %2 and newVersion is %3. ...
  38. Version Signature = "$Windows NT$" Components NetOC=netoc.dll,NetOcSetupProc,netoc.inf Global WindowTitle=Windows Setup - ...
  39. Versions of Windows that require LAN Manager authentication include Windows for Workgroups, Windows CE 4.0, and Windows 95, ...
  40. Very sorry, this Task has not yet been implemented. We are working hard to get these done for you. Email [email protected] ...
  41. Video cannot be shown on the computer monitor because of one of the following reasons: a) Low video memory. Please try using ...
  42. View all instances of a specific object type. RSM VIEW /T[DRIVE|LIBRARY|CHANGER|STORAGESLOT|IEDOOR|IEPORT|PHYSICAL_MEDIA| ...
  43. View and filter NetBIOS name registrations for client names used on your network; add and configure replication partners; ...
  44. View and manage Sites and Services. Sites define the topology and schedules used for Active Directory replication. Services ...
  45. View one or more access points for this service by clicking a binding name. You can then view interfaces and instance information ...
  46. Virtual Bytes is the current size, in bytes, of the virtual address space the process is using. Use of virtual address space ...
  47. Virtual Bytes Peak is the maximum size, in bytes, of virtual address space the process has used at any one time. Use of virtual ...
  48. Virtual Circuit Closed} An existing connection (virtual circuit) has been broken at the remote computer. There is probably ...
  49. Virtual Circuit Closed} The network transport on a remote computer has closed a network connection. There may or may not ...
  50. Virtual Circuit Closed} The network transport on your computer has closed a network connection because it had to wait too ...
  51. Virtual Circuit Closed} The network transport on your computer has closed a network connection. There may or may not be I/O ...
  52. Virtual Memory Minimum Too Low} Your system is low on virtual memory. Windows is increasing the size of your virtual memory ...
  53. Virtual private connections to your computer through the Internet are possible only if your computer has a known name or ...
  54. Virtual Site '%1' can not be started because IIS's running virtual site limit for this operating system platform has all ...
  55. Virtual site '%1' is configured to truncate its log every '%2' bytes. Since this value must be at least 1048576 bytes ( 1 ...
  56. Virtual Site '%1' is configured with MaxConnections equal to '%2'. On this operating system platform IIS only supports 40 ...
  57. Volume %1!s! has %2!d!% free space, but <1% is available for use by Disk Defragmenter (due to reserved system space). To ...
  58. Volume %1!s! has %2!d!% free space, but only %3!d!% is available for use by Disk Defragmenter (due to reserved system space). ...
  59. Volume %1!s! has <1% free space available for use by Disk Defragmenter. To run effectively, Disk Defragmenter requires at ...
  60. Volume %1!s! has a 12-bit FAT partition. Disk Defragmenter does not support 12-bit FAT partitions. To use Disk Defragmenter, ...
  61. Volume %1!s! has only %2!d!% free space available for use by Disk Defragmenter. To run effectively, Disk Defragmenter requires ...
  62. Volume information for this disk cannot be found. This may happen if the disk is a 1394 or a USB device on a Windows 2000 ...
  63. Volume shadow copy creation has continued to report errors after trying %d times. The backup will continue, but the data ...
  64. Volume shadow copy creation has encountered one or more errors. The backup will continue, but the data for these components ...
  65. Volume Shadow Copy Service error: A component was added to the backup document that does not exist in any writer's metadata. ...
  66. Volume Shadow Copy Service error: A critical component required by the Volume Shadow Copy service is not registered. This ...
  67. Volume Shadow Copy Service error: An internal inconsistency was detected in trying to contact shadow copy service writers. ...
  68. Volume Shadow Copy Service error: An unexpected error was encountered cloning a document. The cloned document has no children. ...
  69. Volume Shadow Copy Service error: An unexpected error was encountered examining the XML document. The document is missing ...
  70. Volume Shadow Copy Service error: An unexpected error was encountered examining the XML document. The document is missing ...
  71. Volume Shadow Copy Service error: An unexpected error was encountered when calling QueryInterface for IVssAsync. hr = %1. ...
  72. Volume Shadow Copy Service error: An unexpected error was encountered when QueryInterface for IDispatch was called. hr = ...
  73. Volume Shadow Copy Service error: Cannot find diff areas for creating shadow copies. Please add at least one NTFS drive to ...
  74. Volume Shadow Copy Service error: Cannot find diff areas for creating shadow copies. Please add at least one NTFS drive to ...
  75. Volume Shadow Copy Service error: Cannot find diff areas for creating shadow copies. Please add at least one NTFS drive to ...