Windows 8

  1. User Source Io Owner has exceed the Quota Threshold]% quota threshold for quota on Quota Path on server Server]. The quota ...
  2. User Source Io Owner has reached the quota limit for quota on Quota Path on server Server]. The quota limit is Quota Limit ...
  3. User Source Io Owner has reached the quota limit for quota on Quota Path on server Server]. The quota limit is Quota Limit ...
  4. User Time is the percentage of elapsed time that the process threads spent executing code in user mode. Applications, environment ...
  5. User Time is the percentage of elapsed time that this thread has spent executing code in user mode. Applications, environment ...
  6. User Time is the percentage of elapsed time the processor spends in the user mode. User mode is a restricted processing mode ...
  7. User {0} attempted to save {1} to {2} on the {3} server. This file is in the {4} file group, which is not permitted on the ...
  8. User {0} has exceeded the limit for the quota on {1} on server {2}. The quota limit is {3} MB, and {4} MB currently is in ...
  9. User {0} has exceeded the {1}% quota threshold for the quota on {2} on server {3}. The quota limit is {4} MB, and {5} MB ...
  10. User: %1!s! Domain: %2!s! Connected from: %3!s! Duration: %4!d! days %5!d! hours %6!d! mins %7!d! secs Restriction state: ...
  11. UserFileReads : %1 UserFileReadBytes : %2 UserDiskReads : %3 UserFileWrites : %4 UserFileWriteBytes : %5 UserDiskWrites : ...
  12. UserKeyAndCertFile - Data file containing user private keys and certificates to be archived. This can be any of the following: ...
  13. username% will no longer be able to log on, and all of %username%'s settings will be deleted. However, %username%'s files ...
  14. Users browsing to your site or application could see some privileged information that is contained in the detailed error ...
  15. Users can connect to network resources by using RD Gateway. Network resources can include computers in an Active Directory ...
  16. Users can send scanned documents to an e-mail address. They can also receive an e-mail notification if this operation fails. ...
  17. Users connected to a shared folder or file are disconnected when you close the folder or file and may lose data. When possible, ...
  18. Users in the local domain can be authenticated to use all of the resources in the specified domain or only those resources ...
  19. Users in the local forest can be authenticated to use all of the resources in the specified forest or only those resources ...
  20. Users in the specified domain can be authenticated to use all of the resources in the local domain or only those resources ...
  21. Users in the specified forest can be authenticated to use all of the resources in the local forest or only those resources ...
  22. Users may lose data if disconnected without warning. When possible, notify users before disconnecting them. Do you want to ...
  23. Users might register DNS names that have special significance. By default, the Global Query Block List contains the strings ...
  24. Users on computers running NFS client software can access directories (called shares) on computers running Server for NFS ...
  25. Users that are members of the selected group or groups will be allowed or denied access based on the network policy Access ...
  26. Users will lose their updates if a newer version of the file with conflicting changes is replicated in from another replication ...
  27. Users will not be able to access shared folders by using the NFS protocol. The unused service will consume system resources ...
  28. user`u`user password]`User to Run As. Entering a for the password produces a prompt for the password. The password is not ...
  29. Uses routing information to determine the cost of a route from a specified site to another specified site or sites. The querysites ...
  30. Using a PIN to encrypt the preshared key increases the security of your deployment. Users will need the PIN in order to install ...
  31. Using a test certificate in a production environment is not recommended for security reasons. This certificate should be ...
  32. Using an account with a blank password as the AD LDS service account is a security risk. Do you want to continue using this ...
  33. Using automatic certificate requests, an administrator can specify which types of certificate can be automatically requested ...
  34. Using Cluster-Aware Updating to update this failover cluster could cause downtime, because Automatic Updates may be concurrently ...
  35. Using only your voice, you can start programs, open menus, click buttons and other objects on the screen, dictate text into ...
  36. Using RemoteApp, you can access programs on a remote computer through Remote Desktop Services. Although the programs are ...
  37. Using system protection on a drive that contains other shadow copies will cause older system restore points to be deleted ...
  38. Using system protection on a drive that contains system image backups will cause other shadow copies to be deleted faster ...
  39. Using the contrast control on your display, set the contrast as high as possible without losing the ability to see the wrinkles ...
  40. Using the controls on your display, set the brightness higher or lower until you can distinguish the shirt from the suit ...
  41. Using the DFS Management MMC snap-in, change the path of the staging folder for the replicated folder on the member in the ...
  42. Using the DFS Management MMC snap-in, change the path of the staging folder for the SYSVOL folder on this domain controller. ...
  43. Using the DFS Management MMC snap-in, change the staging folder for the replicated folder on the member in the replication ...
  44. Using the DFS Management MMC snap-in, change the staging folder for the replicated folder on this local computer in the replication ...
  45. Using the DFS Management MMC snap-in, delete the replicated folder from the local computer in the replication group . Add ...
  46. Using the DFS Management MMC snap-in, delete the replicated folder from the member in the replication group . Add the replicated ...
  47. Using the DFS Management MMC snap-in, delete the replicated folder from the member in the replication group . Add the replicated ...
  48. Using the Failover cluster Management UI, online the disk hosting the replicated folder from the member in the replication ...
  49. Using the following variables, you can create a format for automatically generating custom computer names for new installations: ...
  50. Using the same share name for both SMB-based and NFS-based access is not recommended because clients that support both protocols ...
  51. Using the settings below, you can modify the IP/Ports for HTTP and UDP transports. Note: Both RPC-HTTP and HTTP transport ...
  52. Using this switch parameter indicates that computer certificate authentication is to be disabled. Disabling this setting ...
  53. Using this wizard, you can create a Connection Manager profile that customizes Connection Manager for users of your service. ...
  54. Using TTL scoping is not recommended. By enabling TTL scoping, you sacrifice bandwidth in your network, since data will be ...
  55. Using Windows Media Center over a wireless network may result in inconsistent performance. For the highest quality, wire ...
  56. Using your current location and calling card selection, dialing this number could result in a emergency services call to ...
  57. Using your keyboard or the numeric keypad on your Windows Media Center remote control, enter a channel number that you know ...
  58. Using your keyboard or the numeric keypad on your Windows Media Center remote control, enter a three-digit channel that you ...
  59. USN Commands Supported - createjournal Create a USN journal deletejournal Delete a USN journal enumdata Enumerate USN data ...
  60. USN Journal Records Accepted shows the number of update sequence number (USN) journal records that were processed by the ...
  61. USN Journal Records Read shows the number of update sequence number (USN) journal records that were read by the DFS Replication ...
  62. USN Journal Unread Percentage shows the percent of the update sequence number (USN) journal that has not yet been read and ...
  63. Usually, any well-known entry identifiers are replaced by their friendly shorthand form. Specifying /v as a command-line ...
  64. Utilization status of IP address range %1, Managed by service- %2, Service instance - %3, Owner - %4 has changed to %5 from ...
  65. v2 Generate or delete hashes for servers running at least Windows Server 2012. If neither -v1 or -v2 is specified, hashes ...
  66. V3NT 1.3 upgrade and V3Pro 2000 Deluxe are incompatible with this version of Windows. For V3Pro 2000 Deluxe, you should install ...
  67. Valid commands: load Loads a Filter driver unload Unloads a Filter driver filters Lists the Filters currently registered ...
  68. Valid MAC address needs to be specified for failover network adapter setting data for virtual machine '%1'. Assign the static ...
  69. Valid values for intervals are whole numbers in the following ranges: for days, from 0 through 99999; for hours, from 0 through ...
  70. Validate startup settings used by services and drivers, including the Cluster service, cluster storage, Cluster Shared Volumes, ...
  71. Validate that all nodes have identical graphics processing units (GPUs) and that each node has a GPU that supports RemoteFX ...
  72. Validate that cluster resources are online, and list the cluster resources that are running in separate resource monitors. ...
  73. Validate that none of the nodes currently requires a reboot (as part of a software update) and that each node is configured ...
  74. Validate that settings and configuration required by Cluster Shared Volumes are present. This test can only be run with an ...
  75. Validate that the network listeners are running on all the servers. If certificate-based authentication is configured, also ...