Windows Server 2008

  1. This parameter is a Win32_DefragAnalysis object that contains properties describing the extent to which the volume is fragmented. ...
  2. This parameter is the volume that is to be shadowed. This parameter can be specified as a volume drive letter, mount point ...
  3. This parameter is the volume that is used for the shadow copy. This volume is sometimes referred to as the 'original' volume. ...
  4. This parameter is the volume to be used to store the shadow differential area. If this paramter is not supplied the specified ...
  5. This parameter is used to force the original volume to dismount before starting the revert operation. Forcing a volume to ...
  6. This parameter is used to specify the list of drives that should be excluded from autochk at next reboot. The string syntax ...
  7. This parameter is used to specify the list of drives that should be scheduled for autochk at next reboot. The string syntax ...
  8. This parameter is used to specify the list of volumes that should be excluded from autochk at next reboot. The string syntax ...
  9. This parameter is used to specify the list of volumes that should be scheduled for autochk at next reboot. The string syntax ...
  10. This password does not meet your organization's password complexity requirements. Please type a password that meets these ...
  11. This password has already been used to request a (%1) certificate. Only one signing certificate and one exchange certificate ...
  12. This patch package cannot be processed by the Windows Installer service. You must install a Windows service pack that contains ...
  13. This patch package could not be opened. Contact the application vendor to verify that this is a valid Windows Installer patch ...
  14. This patch package could not be opened. Verify that the patch package exists and that you can access it, or contact the application ...
  15. This path references the %configsetroot% environment variable but the answer file does not appear to be part of a configuration ...
  16. This Period mSec - Kernel mode shows the time, in milliseconds, of kernel mode processor time used by all the processes in ...
  17. This Period mSec - Processor shows the time, in milliseconds, of processor time used by all the processes in the Job object, ...
  18. This Period mSec - User mode shows the time, in milliseconds, of user mode processor time used by all the processes in the ...
  19. This permission is inherited from the parent object. Make changes here to create a new permission that overrides the inherited ...
  20. This picture can't be displayed. You might not have enough memory available. Close some programs or, if your hard disk is ...
  21. This picture can't be rotated to fit the page. You might need to use Paint or another image editing program to save the picture ...
  22. This playlist is not valid or is corrupted. Create a new playlist using Windows Media Player, then sync the new playlist ...
  23. This playlist updates when new content is available. If you want changes in the playlist to sync to your device, you should ...
  24. This plex is present in the driver, but has not yet been loaded to the provider cache. A volume modified notification will ...
  25. This policy cannot be created because a policy with this name already exists. Specify another name for this policy, and then ...
  26. This policy cannot be updated because a policy with this name already exists. Specify another name for this policy, and then ...
  27. This policy contains settings that are not supported by this version of the interface. These settings were not exported. ...
  28. This policy contains settings that are not supported by this version of the interface. These settings were not imported. ...
  29. This policy has a profile configured with an EAP method not installed on this machine. The profile will be displayed with ...
  30. This policy has a profile configured with an EAP method not installed on this machine. The profile will be displayed with ...
  31. This policy has one or more profiles configured with EAP method(s) not installed on this machine. Those profiles have been ...
  32. This policy is configured with one or more health policies that are not valid. You must update this policy by removing the ...
  33. This policy module cannot be configured from this computer. For information about enabling remote configuration, refer to ...
  34. This policy requires a license to be issued to each user that connects to the Terminal Server. The allocation of licenses ...
  35. This printer cannot be published. To publish printers on computers running the Windows 2000 or Windows Server 2003 operating ...
  36. This printer has been redirected by the Remote Desktop Connection client. The printing preferences for the client printer ...
  37. This printer has been redirected by the Remote Desktop Connection client. To see the device settings of the client printer, ...
  38. This privacy statement indicates that if you choose to use Windows Meeting Space, certain identification information (such ...
  39. This privacy statement indicates that if you choose to use Windows Meeting Space, certain identification information (such ...
  40. This problem can occur if the remote computer is running a version of Windows that is earlier than Windows Vista, or if the ...
  41. This process is doing excessive disk activities and is impacting the performance of Windows: File Name : %3 Friendly Name ...
  42. This process is using up processor time and is impacting the performance of Windows: File Name : %3 Friendly Name : %5 Version ...
  43. This process is using up too much system memory: File Name : %3 Friendly Name : %5 Version : %7 Workingset size : %8Kb Percent ...
  44. This product needs to be reinstalled before it will work correctly on Windows Vista. Some applications may need to be uninstalled ...
  45. This profile "%s" should be edited using the language version of Windows that matches the profile. Do you want to continue ...
  46. This profile cannot be installed without the correct PIN. The installation is cancelled. If you need a PIN, contact your ...
  47. This profile is built for Longhorn and greater platforms only. This profile cannot be installed on the current platform. ...
  48. This profile is built for Windows Vista and greater platforms only. This profile cannot be installed on the current platform. ...
  49. This profile is set as machine default. If uninstalled, the profile will also get deleted from the machine. Continue with ...
  50. This profile was not built for this processor architecture. Please contact your Administrator to get the appropriate profile ...
  51. This program came with your computer, and does not support Windows Vista. Check with your computer manufacturer to find out ...
  52. This program can't remove a potentially harmful item from the contents of an archived file. To remove the item, you need ...
  53. This program does not have a valid digital signature that verifies its publisher. This program will open outside of Protected ...
  54. This program does not run correctly on this version of Windows. To continue, click Run Program. To exit, click Cancel. For ...
  55. This program does not support Windows Vista. Similar functionality is provided by Windows Vista, so this program isn't required ...
  56. This program experiences known problems on this version of Windows. Contact the program vendor regarding upgrades that are ...
  57. This program might not run as expected on this version of Windows. To continue, click Run Program. To exit, click Cancel. ...
  58. This program needs to run with administrative permissions. Use an administrator command prompt and then run the program again. ...
  59. This program replaces core system components, making this version of Windows unusable. Contact the program vendor regarding ...
  60. This program requires you to print documents with the default printer. Do you want this printer to become your default printer? ...
  61. This program supports your computer hardware; however, it is incompatible with Windows Vista. To see whether updated versions ...
  62. This program used more virtual memory than it needed to, which is called a memory leak. Memory leaks can cause the program ...
  63. This program will open outside of Protected mode. Internet Explorer's Protected mode helps protect your computer. If you ...
  64. This program's rating ({0}) exceeds the maximum allowed rating. To watch the program, press OK on the remote, and then enter ...
  65. This program's rating exceeds the maximum allowed rating. To watch the program, press OK on the remote, and then enter your ...
  66. This project contains source files that are missing or that have been modified after import. Your project cannot be published ...
  67. This property contains the name of a Win32_Property having a value that resolves to the full path to the source directory. ...
  68. This property contains the name of the source files to be moved or copied. This property may be left blank. See the description ...
  69. This property contains the name to be given to the original file after it is moved or copied. If this field is blank, then ...
  70. This property contains the registry value name. If this is Null, then the data entered into the Value proeprty are written ...
  71. This property has been deprecated in favour of the GetAccessMask method of this class due to the expense of calling GetEffectiveRightsFromAcl. ...
  72. This property has the value of the lower 16-bits of the EventIdentifier property. It is present to match the value displayed ...
  73. This property indicates a number that identifies the job object. As a Kernel object job object names are case sensitive. ...
  74. This property indicates the ref count of the profile. If the profile is loaded, the ref count is at least 1. Higher values ...
  75. This property indicates whether the user has a roaming profile configured. NOTE: User has a roaming profile configured does ...