Windows Server 2003
- User Time is the percentage of elapsed time that the process threads spent executing code in user mode. Applications, environment ...
- User Time is the percentage of elapsed time that this thread has spent executing code in user mode. Applications, environment ...
- User Time is the percentage of elapsed time the processor spends in the user mode. User mode is a restricted processing mode ...
- User to be notified upon job completion or failure. This property is restricted to 16 characters under Windows 9x platforms. ...
- UserKeyAndCertFile - Data file containing user private keys and certificates to be archived. This can be any of the following: ...
- Users are prevented from making accidental or intentional system-wide changes. Thus, Users can run certified applications, ...
- Users in the local domain can be authenticated to use all of the resources in the specified domain or only those resources ...
- Users in the local forest can be authenticated to use all of the resources in the specified forest or only those resources ...
- Users in the specified domain can be authenticated to use all of the resources in the local domain or only those resources ...
- Users in the specified forest can be authenticated to use all of the resources in the local forest or only those resources ...
- Users trying to reconnect to this share (%1\%2) will need to supply the correct new password to succeed. Failure to do so ...
- Users With a Damaged Start Menu or Desktop The Start menu or desktop for the following user accounts is inaccessible or incomplete ...
- Users With a Damaged Start Menu or Desktop The Start menu or desktop for the following user accounts is inaccessible or incomplete ...
- Users with limited accounts cannot always install programs. Depending on the program, a user might need administrator privileges ...
- user`u`user password]`User to Run As. Entering a for the password produces a prompt for the password. The password is not ...
- Using a directory service to check the e-mail addresses of your message recipients may slow down the performance of your ...
- Using a PIN to encrypt the pre-shared key increases the security of your deployment. Users will need the PIN in order to ...
- Using a server-based sign-up method, you can completely control the users sign-up experience via files on the server. The ...
- Using automatic certificate requests, an administrator can specify which types of certificate can be automatically requested ...
- Using Internet Gateway, you can use this computer to control the Internet connection for your network. To run Internet Gateway ...
- Using servers for Internet browsing does not adhere to sound security practices because Internet browsing increases the exposure ...
- Using the DISABLE command, you can disable a Windows system service or driver. DISABLE servicename servicename The name of ...
- Using the ENABLE command, you can enable a Windows system service or driver. ENABLE servicename start_type servicename The ...
- Using the following variables, you can create a format for automatically generating custom computer names for new installations: ...
- Using TTL scoping is not recommended. By enabling TTL scoping, you sacrifice bandwidth in your network, since data will be ...
- Using your current location and calling card selection, dialing this number could result in a emergency services call to ...
- Using |technologies |such |as |the |Microsoft |.NET |Framework, |developers |can |employ |multiple |languages |in |single ...
- USN journal for volume %1 cannot be created because the disk is too full. This volume cannot be managed by Remote Storage. ...
- Utility Manager cannot start this application on the secure desktop. Contact your system Administrator for sufficient permissions. ...
- Utility Manager was produced for Microsoft Corporation by ECO Kommunikation, makers of Braille-, speech-based and other access ...
- Vendor ID: %1!s! Qualifier: 2!08x! Version: 3!08x! Global Flags: 4!08x! Num Data Entries: %5!d! File ID: %6!s! Data: Flags: ...
- Verification of the trust between the domain %2 and the domain %3 was unsuccessful because: %1 Resetting the trust passwords ...
- Verification of the trust between the domain %2 and the domain %3 was unsuccessful because: %1 To repair a trust to a pre-Windows ...
- Verification reads the backed-up data to verify its integrity. This step takes extra time, but verification helps ensure ...
- verifier /flags FLAGS /iolevel IOLEVEL /all verifier /flags FLAGS /iolevel IOLEVEL /driver NAME NAME . verifier /reset verifier ...
- Verifying Disk} The media has changed and a verify operation is in progress so no reads or writes may be performed to the ...
- Version overlap with previous version redirection while parsing policy file %1 where oldVersion is %2 and newVersion is %3. ...
- Version Signature = "$Windows NT$" Components NetOC=netoc.dll,NetOcSetupProc,netoc.inf Global WindowTitle=Windows Setup - ...
- Versions of Windows that require LAN Manager authentication include Windows for Workgroups, Windows CE 4.0, and Windows 95, ...
- Very sorry, this Task has not yet been implemented. We are working hard to get these done for you. Email [email protected] ...
- Video cannot be shown on the computer monitor because of one of the following reasons: a) Low video memory. Please try using ...
- View all instances of a specific object type. RSM VIEW /T[DRIVE|LIBRARY|CHANGER|STORAGESLOT|IEDOOR|IEPORT|PHYSICAL_MEDIA| ...
- View and filter NetBIOS name registrations for client names used on your network; add and configure replication partners; ...
- View and manage Sites and Services. Sites define the topology and schedules used for Active Directory replication. Services ...
- View one or more access points for this service by clicking a binding name. You can then view interfaces and instance information ...
- Virtual Bytes is the current size, in bytes, of the virtual address space the process is using. Use of virtual address space ...
- Virtual Bytes Peak is the maximum size, in bytes, of virtual address space the process has used at any one time. Use of virtual ...
- Virtual Circuit Closed} An existing connection (virtual circuit) has been broken at the remote computer. There is probably ...
- Virtual Circuit Closed} The network transport on a remote computer has closed a network connection. There may or may not ...
- Virtual Circuit Closed} The network transport on your computer has closed a network connection because it had to wait too ...
- Virtual Circuit Closed} The network transport on your computer has closed a network connection. There may or may not be I/O ...
- Virtual Memory Minimum Too Low} Your system is low on virtual memory. Windows is increasing the size of your virtual memory ...
- Virtual private connections to your computer through the Internet are possible only if your computer has a known name or ...
- Virtual Site '%1' can not be started because IIS's running virtual site limit for this operating system platform has all ...
- Virtual site '%1' is configured to truncate its log every '%2' bytes. Since this value must be at least 1048576 bytes ( 1 ...
- Virtual Site '%1' is configured with MaxConnections equal to '%2'. On this operating system platform IIS only supports 40 ...
- Volume %1!s! has %2!d!% free space, but <1% is available for use by Disk Defragmenter (due to reserved system space). To ...
- Volume %1!s! has %2!d!% free space, but only %3!d!% is available for use by Disk Defragmenter (due to reserved system space). ...
- Volume %1!s! has <1% free space available for use by Disk Defragmenter. To run effectively, Disk Defragmenter requires at ...
- Volume %1!s! has a 12-bit FAT partition. Disk Defragmenter does not support 12-bit FAT partitions. To use Disk Defragmenter, ...
- Volume %1!s! has only %2!d!% free space available for use by Disk Defragmenter. To run effectively, Disk Defragmenter requires ...
- Volume information for this disk cannot be found. This may happen if the disk is a 1394 or a USB device on a Windows 2000 ...
- Volume shadow copy creation has continued to report errors after trying %d times. The backup will continue, but the data ...
- Volume shadow copy creation has encountered one or more errors. The backup will continue, but the data for these components ...
- Volume Shadow Copy Service error: A component was added to the backup document that does not exist in any writer's metadata. ...
- Volume Shadow Copy Service error: A critical component required by the Volume Shadow Copy service is not registered. This ...
- Volume Shadow Copy Service error: An internal inconsistency was detected in trying to contact shadow copy service writers. ...
- Volume Shadow Copy Service error: An unexpected error was encountered cloning a document. The cloned document has no children. ...
- Volume Shadow Copy Service error: An unexpected error was encountered examining the XML document. The document is missing ...
- Volume Shadow Copy Service error: An unexpected error was encountered examining the XML document. The document is missing ...
- Volume Shadow Copy Service error: An unexpected error was encountered when calling QueryInterface for IVssAsync. hr = %1. ...
- Volume Shadow Copy Service error: An unexpected error was encountered when QueryInterface for IDispatch was called. hr = ...
- Volume Shadow Copy Service error: Cannot find diff areas for creating shadow copies. Please add at least one NTFS drive to ...
- Volume Shadow Copy Service error: Cannot find diff areas for creating shadow copies. Please add at least one NTFS drive to ...
- Volume Shadow Copy Service error: Cannot find diff areas for creating shadow copies. Please add at least one NTFS drive to ...