Windows Server 2003

  1. Warning: the following line represents a registry change that could be ; expressed in an INF file. The data type has been ...
  2. Warning: the following line represents a registry change that could be ; expressed in an INF file. The root key has been ...
  3. Warning: The forward action for this rule will not work when 'encrypt all outgoing messages' or 'sign all outgoing messages' ...
  4. Warning: The information on this page can be viewed by other users on the network. To prevent other users from viewing your ...
  5. Warning: The information on this page can be viewed by other users on the network. To prevent other users from viewing your ...
  6. Warning: The information on this page can be viewed by other users on the network. To prevent other users from viewing your ...
  7. WARNING: the low battery alarm cannot be set to a lower level than the critical battery alarm. Both alarms have been set ...
  8. WARNING: The scheduled task "%s" has been created, but may not run because the task scheduler service is not running on "%2" ...
  9. Warning: the server you are administering has a hard coded limit of 10 connections. Setting a limit higher than 10 is a violation ...
  10. Warning: The setting you have chosen conflicts with another device. To select a different resource setting, click No. To ...
  11. Warning: The signature file specified does not exist. This signature has been removed. This may also affect other signature ...
  12. Warning: The signature file specified is not a valid text-file. This signature has been removed. This may also affect other ...
  13. Warning: The target file system does not support some of the features of the original file system. Some data may not be restored ...
  14. Warning: The use of command line file-unbuffered flag (/FU) requires the volume of the target backup set to be on disks of ...
  15. Warning: The virtual roots table is missing or invalid. At least one valid subkey must be present in HKLM\COMM\HTTPD\VRoots. ...
  16. Warning: The volume you created is larger than 2GB. Some Macintosh clients may not function correctly if the volume size ...
  17. Warning: This computer program is protected by copyright law and international treaties. Unauthorized production or distribution ...
  18. Warning: This computer program is protected by copyright law and international treaties. Unauthorized reproduction or distribution ...
  19. Warning: this computer program is protected by copyright law and international treaties. Unauthorized reproduction or distribution ...
  20. Warning: This computer program is protected by copyright law and international treaties. Unauthorized reproduction or distribution ...
  21. Warning: This computer program is protected by copyright law and international treaties. Unauthorized reproduction or distribution ...
  22. Warning: This is an Active Directory-integrated forwarder. Click Yes if you want to remove the forwarder from both Active ...
  23. Warning: This is an Active Directory-integrated forwarder. If you decide to delete this forwarder from the DNS server, it ...
  24. Warning: This is an Active Directory-integrated zone. Click Yes if you want to remove the zone from both Active Directory ...
  25. Warning: This is an Active Directory-integrated zone. If you decide to delete this zone from the DNS server, it also will ...
  26. WARNING: This operation will make the volume available for use but the data on it may be corrupted or stale. If you have ...
  27. WARNING: This operation will replace all 'User Rights Assignments' made in the chosen GPOs. This may render some server applications ...
  28. Warning: This setup cannot install shared files if they are in use. Before proceeding, we recommend that you close any programs ...
  29. Warning: This setup cannot reinstall shared files if they are in use. Before proceeding, we recommend that you close any ...
  30. Warning: unable to verify if the target disks satisfy the requirement of the command line file-unbuffered flag (/FU) flag. ...
  31. Warning: use of redirected output for large sorts is usually slower than specifying the output file name directly to sort. ...
  32. WARNING: When the run as password is empty the task may not be triggered because of a default security policy on null passwords. ...
  33. WARNING: WINS consistency checking is a very processing and network intensive operation. You may want to perform this only ...
  34. Warning: You are about to completely remove Message Queuing. All queues and messages hosted by this computer will be deleted. ...
  35. WARNING: You have until %1 to logoff. If you have not logged off at this time, your session will be disconnected, and any ...
  36. WARNING:Part of file '%s' is on a previous media. Restoring this file may cause loss of data. Do you want to continue to ...
  37. Warnings ( return to top ) The following issues might require you to obtain files from Microsoft Windows Update Web site ...
  38. WARNINGS = The following issues might require you to obtain files from Microsoft Windows Update Web site or a manufacturer's ...
  39. was configured with an internal network number of %3. This network number conflicts with one of the attached networks. The ...
  40. was opened by File ID successfully the first time but not the second time. No recovery operation was tried on file %2. This ...
  41. We apologize for the inconvenience, but Windows did not start successfully. A recent hardware or software change might have ...
  42. We are downloading the settings needed to configure your e-mail software. This is part of Microsoft's initiative to make ...
  43. We have detected you are running anti-virus software. AVS will not function properly while this is running. Please shut down ...
  44. We need a dial tone in order to establish the phone connection from your computer. Please make sure that these conditions ...
  45. We recommend that you run chkdsk on each volume that becomes available for use after this operation. After this disk is online, ...
  46. We |understand |the |need |to |keep |existing |investments |in |Windows |and |Windows-compatible |software. |So |Microsoft ...
  47. Weakened security has been enabled to allow all MSMQ 1.0 clients and Message Queuing 2.0 clients running under local user ...
  48. Web pictures and backgrounds make great desktop wallpaper. Just right-click the picture you want, and then click Set as Wallpaper ...
  49. WEBDAV|WebDAV|Select if your Web server supports Web Distributed Authoring and Versioning (WebDAV) for publishing content ...
  50. Weight is used to calculate how often connection requests are sent to a specific server in a group of servers that have the ...
  51. Welcome back to the %1 domain. While you were offline, your settings were stored in a local account. Do you want to move ...
  52. Welcome to Microsoft(R) Windows Powered(R) Network Attached Storage. To manage the server remotely, choose from the tasks ...
  53. Welcome to Microsoft(R) Windows Powered(R) Web Server. To manage the server remotely, choose from the tasks listed below. ...
  54. Welcome to the Microsoft(R) Windows Powered(R) Server. You can manage the server remotely using the tasks listed below. To ...
  55. Welcome to the Network Setup Wizard. Before continuing, Windows must install some network support files on your computer ...
  56. Welcome to the Remote Desktop Sharing wizard. This wizard will help you set up your computer to share out its desktop when ...
  57. Welcome to the Web User Interface for Microsoft Windows Server administration. Use the following tasks to start using the ...
  58. Well Known Services (WKS) Well Known Service (WKS) record. Describes the well-known TCP/IP services supported by a particular ...
  59. What you see behind me is the first in a series of screens designed to help you make sure that your computer is set up the ...
  60. When %s logs onto this computer, should the operating system use the roaming profile or just the locally cached copy of the ...
  61. When a block of memory is allotted for future updates, such as the memory allocated to hold discretionary access control ...
  62. When a client certificate is presented, these matching rules will be examined in the order in which they appear below. Upon ...
  63. When a file or folder is deleted in Windows Explorer, a copy of the file or folder is placed in the Recycle Bin. Using this ...
  64. When a Web page is opened in Internet Explorer, Internet Explorer puts restrictions on what the page can do, based on where ...
  65. When all the information has been downloaded, the bar will be completely filled and you'll move to the next screen automatically. ...
  66. When an object identifier begins with either the number 0 or the number 1, the second number must be in the range of 0 to ...
  67. When any of these certificates are presented by a web client and authenticated, the user can automatically be logged in as ...
  68. When applications performing periodic searches for domain controllers (DC) are unable to find a DC, the value set in this ...
  69. When applications performing periodic searches for domain controllers (DC) are unable to find a DC, the value set in this ...
  70. When applications performing periodic searches for Domain Controllers (DCs) are unable to find a DC, the value set in this ...
  71. When asking for client authentication, this server sends a list of trusted certificate authorities to the client. The client ...
  72. When Chkdsk checks your disk drive for errors, it might save lost file fragments as files in your disk drive's root folder. ...
  73. When clients obtain an address, they are given DHCP options such as the IP addresses of routers (default gateways), DNS servers, ...
  74. When files on the managed volumes meet the criteria you set here, Remote Storage copies the data in these files to remote ...
  75. When Group Policy is selecting a domain controller, it will use the option chosen below. There is a policy that may override ...