Windows Server 2003
- Warning: the following line represents a registry change that could be ; expressed in an INF file. The data type has been ...
- Warning: the following line represents a registry change that could be ; expressed in an INF file. The root key has been ...
- Warning: The forward action for this rule will not work when 'encrypt all outgoing messages' or 'sign all outgoing messages' ...
- Warning: The information on this page can be viewed by other users on the network. To prevent other users from viewing your ...
- Warning: The information on this page can be viewed by other users on the network. To prevent other users from viewing your ...
- Warning: The information on this page can be viewed by other users on the network. To prevent other users from viewing your ...
- WARNING: the low battery alarm cannot be set to a lower level than the critical battery alarm. Both alarms have been set ...
- WARNING: The scheduled task "%s" has been created, but may not run because the task scheduler service is not running on "%2" ...
- Warning: the server you are administering has a hard coded limit of 10 connections. Setting a limit higher than 10 is a violation ...
- Warning: The setting you have chosen conflicts with another device. To select a different resource setting, click No. To ...
- Warning: The signature file specified does not exist. This signature has been removed. This may also affect other signature ...
- Warning: The signature file specified is not a valid text-file. This signature has been removed. This may also affect other ...
- Warning: The target file system does not support some of the features of the original file system. Some data may not be restored ...
- Warning: The use of command line file-unbuffered flag (/FU) requires the volume of the target backup set to be on disks of ...
- Warning: The virtual roots table is missing or invalid. At least one valid subkey must be present in HKLM\COMM\HTTPD\VRoots. ...
- Warning: The volume you created is larger than 2GB. Some Macintosh clients may not function correctly if the volume size ...
- Warning: This computer program is protected by copyright law and international treaties. Unauthorized production or distribution ...
- Warning: This computer program is protected by copyright law and international treaties. Unauthorized reproduction or distribution ...
- Warning: this computer program is protected by copyright law and international treaties. Unauthorized reproduction or distribution ...
- Warning: This computer program is protected by copyright law and international treaties. Unauthorized reproduction or distribution ...
- Warning: This computer program is protected by copyright law and international treaties. Unauthorized reproduction or distribution ...
- Warning: This is an Active Directory-integrated forwarder. Click Yes if you want to remove the forwarder from both Active ...
- Warning: This is an Active Directory-integrated forwarder. If you decide to delete this forwarder from the DNS server, it ...
- Warning: This is an Active Directory-integrated zone. Click Yes if you want to remove the zone from both Active Directory ...
- Warning: This is an Active Directory-integrated zone. If you decide to delete this zone from the DNS server, it also will ...
- WARNING: This operation will make the volume available for use but the data on it may be corrupted or stale. If you have ...
- WARNING: This operation will replace all 'User Rights Assignments' made in the chosen GPOs. This may render some server applications ...
- Warning: This setup cannot install shared files if they are in use. Before proceeding, we recommend that you close any programs ...
- Warning: This setup cannot reinstall shared files if they are in use. Before proceeding, we recommend that you close any ...
- Warning: unable to verify if the target disks satisfy the requirement of the command line file-unbuffered flag (/FU) flag. ...
- Warning: use of redirected output for large sorts is usually slower than specifying the output file name directly to sort. ...
- WARNING: When the run as password is empty the task may not be triggered because of a default security policy on null passwords. ...
- WARNING: WINS consistency checking is a very processing and network intensive operation. You may want to perform this only ...
- Warning: You are about to completely remove Message Queuing. All queues and messages hosted by this computer will be deleted. ...
- WARNING: You have until %1 to logoff. If you have not logged off at this time, your session will be disconnected, and any ...
- WARNING:Part of file '%s' is on a previous media. Restoring this file may cause loss of data. Do you want to continue to ...
- Warnings ( return to top ) The following issues might require you to obtain files from Microsoft Windows Update Web site ...
- WARNINGS = The following issues might require you to obtain files from Microsoft Windows Update Web site or a manufacturer's ...
- was configured with an internal network number of %3. This network number conflicts with one of the attached networks. The ...
- was opened by File ID successfully the first time but not the second time. No recovery operation was tried on file %2. This ...
- We apologize for the inconvenience, but Windows did not start successfully. A recent hardware or software change might have ...
- We are downloading the settings needed to configure your e-mail software. This is part of Microsoft's initiative to make ...
- We have detected you are running anti-virus software. AVS will not function properly while this is running. Please shut down ...
- We need a dial tone in order to establish the phone connection from your computer. Please make sure that these conditions ...
- We recommend that you run chkdsk on each volume that becomes available for use after this operation. After this disk is online, ...
- We |understand |the |need |to |keep |existing |investments |in |Windows |and |Windows-compatible |software. |So |Microsoft ...
- Weakened security has been enabled to allow all MSMQ 1.0 clients and Message Queuing 2.0 clients running under local user ...
- Web pictures and backgrounds make great desktop wallpaper. Just right-click the picture you want, and then click Set as Wallpaper ...
- WEBDAV|WebDAV|Select if your Web server supports Web Distributed Authoring and Versioning (WebDAV) for publishing content ...
- Weight is used to calculate how often connection requests are sent to a specific server in a group of servers that have the ...
- Welcome back to the %1 domain. While you were offline, your settings were stored in a local account. Do you want to move ...
- Welcome to Microsoft(R) Windows Powered(R) Network Attached Storage. To manage the server remotely, choose from the tasks ...
- Welcome to Microsoft(R) Windows Powered(R) Web Server. To manage the server remotely, choose from the tasks listed below. ...
- Welcome to the Microsoft(R) Windows Powered(R) Server. You can manage the server remotely using the tasks listed below. To ...
- Welcome to the Network Setup Wizard. Before continuing, Windows must install some network support files on your computer ...
- Welcome to the Remote Desktop Sharing wizard. This wizard will help you set up your computer to share out its desktop when ...
- Welcome to the Web User Interface for Microsoft Windows Server administration. Use the following tasks to start using the ...
- Well Known Services (WKS) Well Known Service (WKS) record. Describes the well-known TCP/IP services supported by a particular ...
- What you see behind me is the first in a series of screens designed to help you make sure that your computer is set up the ...
- When %s logs onto this computer, should the operating system use the roaming profile or just the locally cached copy of the ...
- When a block of memory is allotted for future updates, such as the memory allocated to hold discretionary access control ...
- When a client certificate is presented, these matching rules will be examined in the order in which they appear below. Upon ...
- When a file or folder is deleted in Windows Explorer, a copy of the file or folder is placed in the Recycle Bin. Using this ...
- When a Web page is opened in Internet Explorer, Internet Explorer puts restrictions on what the page can do, based on where ...
- When all the information has been downloaded, the bar will be completely filled and you'll move to the next screen automatically. ...
- When an object identifier begins with either the number 0 or the number 1, the second number must be in the range of 0 to ...
- When any of these certificates are presented by a web client and authenticated, the user can automatically be logged in as ...
- When applications performing periodic searches for domain controllers (DC) are unable to find a DC, the value set in this ...
- When applications performing periodic searches for domain controllers (DC) are unable to find a DC, the value set in this ...
- When applications performing periodic searches for Domain Controllers (DCs) are unable to find a DC, the value set in this ...
- When asking for client authentication, this server sends a list of trusted certificate authorities to the client. The client ...
- When Chkdsk checks your disk drive for errors, it might save lost file fragments as files in your disk drive's root folder. ...
- When clients obtain an address, they are given DHCP options such as the IP addresses of routers (default gateways), DNS servers, ...
- When files on the managed volumes meet the criteria you set here, Remote Storage copies the data in these files to remote ...
- When Group Policy is selecting a domain controller, it will use the option chosen below. There is a policy that may override ...