Windows 10
- Value for property WS_SERVICE_ENDPOINT_PROPERTY_MAX_ACCEPTING_CHANNELS cannot be greater than value for property WS_SERV ...
- Value for the monitoring interval is not valid. The value must be an even fraction (in hours) of a 24-hour day or whole days. ...
- Value is not supported within a declarative processing context, if you want it to be supported mark it using WinJS.Utili ...
- Values: 0x0 - Enable all file metadata optimization 0x1 - Disable full file metadata optimization only 0x2 - Disable incremental ...
- Variable reference is not valid. '$' was not followed by a valid variable name character. Consider using ${} to delimit the ...
- Variable reference is not valid. ':' was not followed by a valid variable name character. Consider using ${} to delimit the ...
- Variable to contain the name of the email server. This can be used instead of the HostName parameter in the Send-MailMessage ...
- VaultCmd /addcreds: | /credtype: | /identity: /authenticator: /resource: /savedBy: Example: vaultcmd /addcreds:"Web Credentials" ...
- VaultCmd /deletecreds: | /credtype: | /identity: /resource: Example: vaultcmd /deletecreds:"Web Credentials" /credtype:{ ...
- Vendor ID: %1!s! Qualifier: 2!08x! Version: 3!08x! Global Flags: 4!08x! Num Data Entries: %5!d! File ID: %6!s! Data: Flags: ...
- Verification of the trust between the domain %2 and the domain %3 was unsuccessful because: %1 Resetting the trust passwords ...
- Verification of the trust between the domain %2 and the domain %3 was unsuccessful because: %1 To repair a trust to a pre-Windows ...
- Verification operation failed. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Cryptographic Parameters: ...
- Verifies that each received packet that is supposed to arrive over a transport mode security association arrives securely. ...
- Verify that the driver to support SR-IOV (supplied by the vendor of the network adapter) is installed in the guest operating ...
- Verify that the file location and that the information in the file contains the expected owner password. If you built the ...
- Verify that the network connections of this computer are configured with the correct IP addresses of the DNS servers to be ...
- Verify that the wireless security settings on this computer are compatible with "%ws" If you set up or own this network, ...
- Verify that you typed "%ShareName%" correctly, and then try again Windows can't find "%UNCPath%". The following names are ...
- Verify that you typed "%ShareName%" correctly, and then try again Windows can't find "%UNCPath%". The following names are ...
- Verify that you typed "%ShareName%" correctly, and then try again Windows can't find "%UNCPath%". The name might be misspelled. ...
- Verify that you typed the name correctly, and then try again Windows can't find "%UNCPath%". The following names are similar: ...
- Verify that you typed the name correctly, and then try again Windows can't find "%UNCPath%". The following names are similar: ...
- Verify that you typed the name correctly, and then try again Windows can't find "%UNCPath%". The name might be misspelled. ...
- Verify that your wireless network adapter settings are compatible with "%SSID%" If you set up or own this network, change ...
- Verify the information in the file contains the expected owner password content. If you built the file manually, verify that ...
- Verify the network security key for "%ws" If the key is correct, check for possible sources of interference such as microwave ...
- Verify the network security key for "%ws" View the security settings. You can then type the correct wireless network security ...
- Verify the network security key for "%ws" View the security settings. You can then type the correct wireless network security ...
- Verify the network security key for "%ws" You should disconnect and then connect to this network again. You can then enter ...
- Verify the network security key for "%ws" You should disconnect if you're connected, and then connect to this network again. ...
- Verify the path points to a correct network location and that the supplied credentials can be used for write access to the ...
- Verifying Disk} The media has changed and a verify operation is in progress so no reads or writes may be performed to the ...
- Verifying the current media failed. The media might be corrupted. You can retry the current media. If the issue persists, ...
- Version '{0}' of module '{1}' is already installed at '{2}'. To delete version '{3}' and install version '{4}', run Install-Module, ...
- Version '{0}' of module '{1}' is already installed at '{2}'. To reinstall this version '{3}', run Install-Module or Updated-Module ...
- Version information of the current or last running operating system on this physical computer system. See CIM_OperatingSystem.Version ...
- VERSION NOT SUPPORTED - The server does not support, or refuses to support, the HTTP protocol version that was used in the ...
- Version not supported for Virtual device type %3 in virtual machine object %1. (Virtual machine object ID %2. Virtual device ...
- Version number of the specified file system. This is currently only valid for UDF. The default value (zero) will cause the ...
- VESA, PCI, VGA, and TPM = USEFIRMWAREPCISETTINGS (bool) Uses BIOS-configured Peripheral Component Interconnect (PCI) resources. ...
- VHD operations do not support the /Optimize or /CheckIntegrity arguments. The unsupported arguments were ignored. For more ...
- Video memory resources are over-utilized and there is thrashing happening as a result. Reducing number of running programs ...
- Video memory resources are over-utilized. Reducing number of running programs and open windows may help resolve this condition ...
- View and change system and security status, back up and restore file and system settings, update your computer, view RAM ...
- View and manage Sites and Services. Sites define the topology and schedules used for Active Directory Domain Services replication. ...
- View available wireless networks and try connecting to a different network Contact your network administrator for further ...
- View available wireless networks You can then try connecting to "%ws" again or try connecting to a different network. If ...
- View available wireless networks You should disconnect, then connect to "%ws" again and enter the correct network security ...
- View information about currently applied firewall and connection security rules and security associations for active network ...
- View is an abstract class that provides a common superclass for classes providing de-normalized, aggregate representations ...
- View problem reports that can be reported to Microsoft. When solutions are available, they will appear in Security and Maintenance. ...
- View the wireless network adapter settings on this computer to verify they are compatible with this network If you set up ...
- View the wireless network adapter settings on this computer to verify they are compatible with this network If you set up ...
- View the wireless network settings on this computer to verify they are compatible with this network Contact the network administrator ...
- View the wireless network settings on this computer to verify they are compatible with this network Contact the network administrator ...
- View the wireless security settings on this computer to verify they are compatible with this network Contact the network ...
- View wireless network authentication settings for "%ws" You can then enable 802.1X authentication. If this does not fix the ...
- View wireless security settings to verify that correct encryption type is selected Contact the network administrator for ...
- View wireless security settings to verify that the correct network authentication method is selected Contact the network ...
- Violent actions involving cartoon-like situations and characters. May include violence where a character is unharmed after ...
- Violent actions of a fantasy nature, involving human or non-human characters in situations easily distinguishable from real ...
- Virtual Bytes is the current size, in bytes, of the virtual address space the process is using. Use of virtual address space ...
- Virtual Bytes Peak is the maximum size, in bytes, of virtual address space the process has used at any one time. Use of virtual ...
- Virtual Circuit Closed} An existing connection (virtual circuit) has been broken at the remote computer. There is probably ...
- Virtual Circuit Closed} The network transport on a remote computer has closed a network connection. There may or may not ...
- Virtual Circuit Closed} The network transport on your computer has closed a network connection because it had to wait too ...
- Virtual Circuit Closed} The network transport on your computer has closed a network connection. There may or may not be I/O ...
- Virtual disk %1 could not be repaired because there is not enough free space in the storage pool. Replace any failed or disconnected ...
- Virtual disk %1 has failed a write operation to all its copies. You can online the disk by using the following commands in ...
- Virtual disk %1 requires a data integrity scan. Data on the disk is out-of-sync and a data integrity scan is required. To ...
- Virtual disk '%3' failed to open because a problem occurred when attempting to open a virtual disk in the differencing chain, ...
- Virtual disk '%3' failed to open because a problem occurred when attempting to open a virtual disk in the differencing chain, ...
- Virtual Disk Service (VDS) is not registered. VDS supports Windows 2003 or later. Check the operating system version on the ...
- Virtual domain controller cloning failed to bind to the primary domain controller %1. The returned error code is %2 (%3). ...