Windows Server 2008

  1. This LPT port name is being used by another device (such as another LPT port). Using duplicate names can lead to inaccessible ...
  2. This LUN will no longer be visible to this server or cluster. Be certain you have shut down applications that use this LUN. ...
  3. This LUN will no longer be visible to this server/cluster and target(s). Be certain you have shut down applications that ...
  4. This machine is a Domain Controller but the Active Directory (NTDS) service is stopped. Restore cannot be performed while ...
  5. This machine is a Domain Controller in Directory Service Restore Mode (DSRM). Backup cannot be performed in this case, please ...
  6. This machine is a Domain Controller with the Active Directory service (NTDS) stopped. Backup cannot be performed, nor can ...
  7. This may be a transient error. Try running dcdiag again in a few minutes. If the error persists, there might be a problem ...
  8. This may be caused by allowing dsadd to auto-generate the downlevel computer name. Try specifying the -samid switch with ...
  9. This may be caused by allowing dsadd to auto-generate the downlevel group name. Try specifying the -samid switch with a value. ...
  10. This meeting is limited to your current network subnet . To connect to the meeting, other people must be connected to the ...
  11. This meeting is on a network subnet that you are not connected to. To connect to this meeting, connect to the subnet that ...
  12. This meeting is on a network that you are not connected to. To connect to this meeting, connect to the network that the other ...
  13. This meeting is on a network that you are not connected to. To connect to this meeting, you need an Internet connection. ...
  14. This member has one or more primary memberships. If this member is deleted then you must manually configure a separate membership ...
  15. This member is the only member that can supply On Demand content to one or more other members. If this member is deleted ...
  16. This member is the only member that can supply On Demand content to one or more other members. If this membership is disabled ...
  17. This Message Queuing Cluster Resource provides a communications infrastructure for distributed, asynchronous messaging applications. ...
  18. This method invokes the chkdsk operation on the disk. The method is applicable to only those instances of logical disk that ...
  19. This method invokes the chkdsk operation on the volume. The method is applicable to only those volume instances that represent ...
  20. This method is used exclude disks from the chkdsk operation to be run at the next reboot. If not excluded, chkdsk is performed ...
  21. This method is used schedule chkdsk to be run at the next reboot if the dirty bit has been set. The method is applicable ...
  22. This method is used schedule chkdsk to be run at the next reboot if the dirty bit has been set.The method is applicable to ...
  23. This method is used to add a mount point directory for the volume. The result of this method is the creation of a Win32_MountPoint ...
  24. This method is used to exclude volumes from the chkdsk operation to be run at the next reboot. If not excluded, chkdsk is ...
  25. This method requires a computer with a Web browser and Internet access. This computer does not have to be connected to the ...
  26. This method resets the values of the thresholds to hardware defaults. This method returns 0 if successful, 1 if unsupported ...
  27. This method returns the USBDevice Descriptor as specified by the input parameters. Each parameter is briefly described here ...
  28. This method will advertise an associated Win32_Product using the installation package provided through PackageLocation and ...
  29. This method will configure the associated instance of Win32_Product to the specified install state and level. The method ...
  30. This method will configure the associated instance of Win32_SoftwareFeature to the specified install state. The method can ...
  31. This method Will install an associated Win32_Product using the installation package provided through PackageLocation and ...
  32. This method will preform an administrative install of an associated Win32_Product using the installation package provided ...
  33. This method will reinstall the associated instance of Win32_Product using the specified reinstallation mode. The method can ...
  34. This method will reinstall the associated instance of Win32_SoftwareFeature using the specified reinstallation mode. The ...
  35. This method will uninstall the associated instance of Win32_Product. The method can return the following values: 0 - Success. ...
  36. This method will upgrade the associated Win32_Product using the upgrade package provided through PackageLocation and any ...
  37. This might be a phishing website. Phishing websites impersonate trustworthy websites for the purpose of obtaining your personal ...
  38. This might have been caused by one of the following conditions: Your current security settings prevent this APPLET from being ...
  39. This might have been caused by one of the following conditions: Your current security settings prevent this EMBED from being ...
  40. This might have been caused by one of the following conditions: Your current security settings prevent this OBJECT from being ...
  41. This mirror cannot be removed because the mirrored volume is currently missing or regenerating. Retry this operation when ...
  42. This mode will give terminal server users full access to critical registry and file locations. Use this mode with caution ...
  43. This modified version of the kernel32!CreateFile* APIs prevents an application from using the FILE_FLAG_NO_BUFFERING flag ...
  44. This modified version of the kernel32!CreateFile* APIs prevents an application from using the FILE_FLAG_OVERLAPPED flag if ...
  45. This name suffix conflicts with name suffix in remote forest. Click Refresh button and try to edit the name suffix again. ...
  46. This name suffix is defined as a user principal name (UPN) suffix in the local forest: %1. Therefore, Windows routes all ...
  47. This name suffix is enabled for routing to the forest: %1. Therefore, Windows routes all authentication requests that use ...
  48. This namespace does not support the requested operation. Please upgrade all namespace servers for full functional support. ...
  49. This NC (%1) is supposed to be replicated to this server, but has not been replicated yet. This could be because the replica ...
  50. This network will appear in the list of wireless networks and will stay active until everyone disconnects from it. Give the ...
  51. This node contains registry settings that do not correspond to an Administrative Template policy (e.g. they did not originate ...
  52. This note contains changes on pages that didn't load successfully. Rename the note to save these changes without affecting ...
  53. This object contains the data identifying either the initial load device (its key) or the boot service that requested the ...
  54. This object contains the data needed to find either the initial load device (its key) or the boot service to request the ...
  55. This object is not allowed to change its grandparent container. Moves are not forbidden on this object, but are restricted ...
  56. This object may not be moved across domain boundaries either because cross-domain moves for this class are disallowed, or ...
  57. this one bit flag indicates whether or not the WBINVD instruction works properly,if this bit is not set we can not use S2, ...
  58. This operation can only be performed on the Naming Master. Please retry the operation after connecting to the Naming FSMO: ...
  59. This operation cannot be performed because one or more of the selected objects have active property sheets. Close the active ...
  60. This operation cannot be performed because the snap-in is connected to a Domain Controller that is not running Windows Server ...
  61. This operation cannot be performed on the cluster resource as it the quorum resource. You may not bring the quorum resource ...
  62. This operation has been cancelled due to restrictions in effect on this computer. Please contact your system administrator. ...
  63. This operation is not supported by the remote Message Queuing service. For example, MQReceiveMessageByLookupId is not supported ...
  64. This operation may take a long time and will affect all users. Do you want to start the move now, or wait until the next ...
  65. This operation measures the memory performance of system memory by copying data from one memory buffer to another. SSE or ...
  66. This operation measures the performance of the system by decoding a file containing video and audio streams. The process ...
  67. This operation measures the performance of the system by decoding and/or encoding a file containing video and audio streams. ...
  68. This operation provides metrics on disk performance via a profiling mechanism. Sequential Read/Write and Random Read/Write ...
  69. This operation retrieves owner-version maps from different WINS servers. It checks the consistency of the databases by ensuring ...
  70. This operation will add all the computer security principals from the Auth2 list of the RODC to the Allow list. Do you wish ...
  71. This operation will add all the security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
  72. This operation will add all user security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
  73. This operation will completely re-build the indexed locations on your computer and might resolve problems if your search ...
  74. This operation will delete all user-defined policies and replace their references in Calendar-events and Schedules with Calendar ...
  75. This operation will delete member "{0}" from the replication group. All replicated folders in the replication group on this ...