Windows 10

  1. Value for property WS_SERVICE_ENDPOINT_PROPERTY_MAX_ACCEPTING_CHANNELS cannot be greater than value for property WS_SERV ...
  2. Value for the monitoring interval is not valid. The value must be an even fraction (in hours) of a 24-hour day or whole days. ...
  3. Value is not supported within a declarative processing context, if you want it to be supported mark it using WinJS.Utili ...
  4. Values: 0x0 - Enable all file metadata optimization 0x1 - Disable full file metadata optimization only 0x2 - Disable incremental ...
  5. Variable reference is not valid. '$' was not followed by a valid variable name character. Consider using ${} to delimit the ...
  6. Variable reference is not valid. ':' was not followed by a valid variable name character. Consider using ${} to delimit the ...
  7. Variable to contain the name of the email server. This can be used instead of the HostName parameter in the Send-MailMessage ...
  8. VaultCmd /addcreds: | /credtype: | /identity: /authenticator: /resource: /savedBy: Example: vaultcmd /addcreds:"Web Credentials" ...
  9. VaultCmd /deletecreds: | /credtype: | /identity: /resource: Example: vaultcmd /deletecreds:"Web Credentials" /credtype:{ ...
  10. Vendor ID: %1!s! Qualifier: 2!08x! Version: 3!08x! Global Flags: 4!08x! Num Data Entries: %5!d! File ID: %6!s! Data: Flags: ...
  11. Verification of the trust between the domain %2 and the domain %3 was unsuccessful because: %1 Resetting the trust passwords ...
  12. Verification of the trust between the domain %2 and the domain %3 was unsuccessful because: %1 To repair a trust to a pre-Windows ...
  13. Verification operation failed. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Cryptographic Parameters: ...
  14. Verifies that each received packet that is supposed to arrive over a transport mode security association arrives securely. ...
  15. Verify that the driver to support SR-IOV (supplied by the vendor of the network adapter) is installed in the guest operating ...
  16. Verify that the file location and that the information in the file contains the expected owner password. If you built the ...
  17. Verify that the network connections of this computer are configured with the correct IP addresses of the DNS servers to be ...
  18. Verify that the wireless security settings on this computer are compatible with "%ws" If you set up or own this network, ...
  19. Verify that you typed "%ShareName%" correctly, and then try again Windows can't find "%UNCPath%". The following names are ...
  20. Verify that you typed "%ShareName%" correctly, and then try again Windows can't find "%UNCPath%". The following names are ...
  21. Verify that you typed "%ShareName%" correctly, and then try again Windows can't find "%UNCPath%". The name might be misspelled. ...
  22. Verify that you typed the name correctly, and then try again Windows can't find "%UNCPath%". The following names are similar: ...
  23. Verify that you typed the name correctly, and then try again Windows can't find "%UNCPath%". The following names are similar: ...
  24. Verify that you typed the name correctly, and then try again Windows can't find "%UNCPath%". The name might be misspelled. ...
  25. Verify that your wireless network adapter settings are compatible with "%SSID%" If you set up or own this network, change ...
  26. Verify the information in the file contains the expected owner password content. If you built the file manually, verify that ...
  27. Verify the network security key for "%ws" If the key is correct, check for possible sources of interference such as microwave ...
  28. Verify the network security key for "%ws" View the security settings. You can then type the correct wireless network security ...
  29. Verify the network security key for "%ws" View the security settings. You can then type the correct wireless network security ...
  30. Verify the network security key for "%ws" You should disconnect and then connect to this network again. You can then enter ...
  31. Verify the network security key for "%ws" You should disconnect if you're connected, and then connect to this network again. ...
  32. Verify the path points to a correct network location and that the supplied credentials can be used for write access to the ...
  33. Verifying Disk} The media has changed and a verify operation is in progress so no reads or writes may be performed to the ...
  34. Verifying the current media failed. The media might be corrupted. You can retry the current media. If the issue persists, ...
  35. Version '{0}' of module '{1}' is already installed at '{2}'. To delete version '{3}' and install version '{4}', run Install-Module, ...
  36. Version '{0}' of module '{1}' is already installed at '{2}'. To reinstall this version '{3}', run Install-Module or Updated-Module ...
  37. Version information of the current or last running operating system on this physical computer system. See CIM_OperatingSystem.Version ...
  38. VERSION NOT SUPPORTED - The server does not support, or refuses to support, the HTTP protocol version that was used in the ...
  39. Version not supported for Virtual device type %3 in virtual machine object %1. (Virtual machine object ID %2. Virtual device ...
  40. Version number of the specified file system. This is currently only valid for UDF. The default value (zero) will cause the ...
  41. VESA, PCI, VGA, and TPM = USEFIRMWAREPCISETTINGS (bool) Uses BIOS-configured Peripheral Component Interconnect (PCI) resources. ...
  42. VHD operations do not support the /Optimize or /CheckIntegrity arguments. The unsupported arguments were ignored. For more ...
  43. Video memory resources are over-utilized and there is thrashing happening as a result. Reducing number of running programs ...
  44. Video memory resources are over-utilized. Reducing number of running programs and open windows may help resolve this condition ...
  45. View and change system and security status, back up and restore file and system settings, update your computer, view RAM ...
  46. View and manage Sites and Services. Sites define the topology and schedules used for Active Directory Domain Services replication. ...
  47. View available wireless networks and try connecting to a different network Contact your network administrator for further ...
  48. View available wireless networks You can then try connecting to "%ws" again or try connecting to a different network. If ...
  49. View available wireless networks You should disconnect, then connect to "%ws" again and enter the correct network security ...
  50. View information about currently applied firewall and connection security rules and security associations for active network ...
  51. View is an abstract class that provides a common superclass for classes providing de-normalized, aggregate representations ...
  52. View problem reports that can be reported to Microsoft. When solutions are available, they will appear in Security and Maintenance. ...
  53. View the wireless network adapter settings on this computer to verify they are compatible with this network If you set up ...
  54. View the wireless network adapter settings on this computer to verify they are compatible with this network If you set up ...
  55. View the wireless network settings on this computer to verify they are compatible with this network Contact the network administrator ...
  56. View the wireless network settings on this computer to verify they are compatible with this network Contact the network administrator ...
  57. View the wireless security settings on this computer to verify they are compatible with this network Contact the network ...
  58. View wireless network authentication settings for "%ws" You can then enable 802.1X authentication. If this does not fix the ...
  59. View wireless security settings to verify that correct encryption type is selected Contact the network administrator for ...
  60. View wireless security settings to verify that the correct network authentication method is selected Contact the network ...
  61. Violent actions involving cartoon-like situations and characters. May include violence where a character is unharmed after ...
  62. Violent actions of a fantasy nature, involving human or non-human characters in situations easily distinguishable from real ...
  63. Virtual Bytes is the current size, in bytes, of the virtual address space the process is using. Use of virtual address space ...
  64. Virtual Bytes Peak is the maximum size, in bytes, of virtual address space the process has used at any one time. Use of virtual ...
  65. Virtual Circuit Closed} An existing connection (virtual circuit) has been broken at the remote computer. There is probably ...
  66. Virtual Circuit Closed} The network transport on a remote computer has closed a network connection. There may or may not ...
  67. Virtual Circuit Closed} The network transport on your computer has closed a network connection because it had to wait too ...
  68. Virtual Circuit Closed} The network transport on your computer has closed a network connection. There may or may not be I/O ...
  69. Virtual disk %1 could not be repaired because there is not enough free space in the storage pool. Replace any failed or disconnected ...
  70. Virtual disk %1 has failed a write operation to all its copies. You can online the disk by using the following commands in ...
  71. Virtual disk %1 requires a data integrity scan. Data on the disk is out-of-sync and a data integrity scan is required. To ...
  72. Virtual disk '%3' failed to open because a problem occurred when attempting to open a virtual disk in the differencing chain, ...
  73. Virtual disk '%3' failed to open because a problem occurred when attempting to open a virtual disk in the differencing chain, ...
  74. Virtual Disk Service (VDS) is not registered. VDS supports Windows 2003 or later. Check the operating system version on the ...
  75. Virtual domain controller cloning failed to bind to the primary domain controller %1. The returned error code is %2 (%3). ...