Windows Server 2008
- COM+ Services was unable to initialize security infrastructure due to a failure in the system API shown below. This is often ...
- COM+ Services was unable to load a required string resource. The string resource identifier was not found. This results from ...
- COM+ Services was unable to obtain local SAM information. COM+ will continue to operate normally, but any calls between local ...
- COM+ Services was unable to process a component's call to IsCallerInRole due to an unexpected failure. The unexpected error ...
- COM+ was unable to set up the ODBC shared environment, which means that automatic transaction enlistment will not work.%1%0 ...
- Command Extensions are enabled by default. You may also disable extensions for a particular invocation by using the /E:OFF ...
- Command line options: /Q - Quiet modes for package, /T: - Specifies temporary working folder, /C - Extract files only to ...
- Command line parameters include: /answer[:filename /unattend[:filename /adv /CreateDCAccount /UseExistingAccount:Attach /answer ...
- Command line parameters include: /answer[:filename /unattend[:filename /adv /uninstallBinaries /?[:{Promotion | CreateDcAccount ...
- Command line supplement for the Security Configuration Wizard (SCW). Syntax: scwcmd analyze | configure | register | rollback ...
- Command line usage: WINSAT switches Valid assessment names formal run the full set of assessments and save the results features ...
- Command-line Tools for Windows Server Backup enable you to create and manage scheduled backups of this server using Windows ...
- Commands available are: NET ACCOUNTS NET HELPMSG NET STATISTICS NET COMPUTER NET LOCALGROUP NET STOP NET CONFIG NET PAUSE ...
- Commands Supported - behavior Control file system behavior dirty Manage volume dirty bit file File specific commands fsinfo ...
- Commands Supported - list List objects transaction Commands related to transactions resolve Resolve forget Forget a committed ...
- Commands: (identifiers are shown in uppercase, means optional) NAME - print info about the host/domain NAME using default ...
- Commerce Server 2000 has a known compatibility issue with this version of Windows and might not run as expected. For more ...
- Commerce Server 2002 has a known compatibility issue with this version of Windows and might not run as expected. For more ...
- Commit Limit is the amount of virtual memory that can be committed without having to extend the paging file(s). It is measured ...
- Committed Bytes In Use is the ratio of Memory\Committed Bytes to the Memory\Commit Limit. Committed memory is the physical ...
- Committed Bytes is the amount of committed virtual memory, in bytes. Committed memory is the physical memory which has space ...
- Common HTTP Features supports basic HTTP functionality, such as delivering standard file formats and configuring custom server ...
- communication mode defines the form of communication in order to obtain support. For example, phone communication (value=2), ...
- Communication port '%1' to the '%2' filter driver was disconnected. The '%2' filter driver may need to be started. Retrying. ...
- CommunicationInfo provides the details of the communication mode. For example, if the communication mode is 'Phone', CommunicationInfo ...
- Compaq Insight Manager has a known compatibility issue due to security enhancements in this version of Windows. For an update ...
- Compare the printed pattern with the sample above. If any segments are missing in the printed pattern, click the Clean button. ...
- Compare the printed pattern with the sample above. If any segments are missing in the printed pattern, click the Clean button. ...
- Compare the printed pattern with the sample above. If the nozzle check page does not complete satisfactorily, click the Clean ...
- Compare the printed pattern with the sample above. If the nozzle check page does not print satisfactorily, click the Clean ...
- Compare the printed pattern with the sample above. If the nozzle check pattern does not print satisfactorily, click Clean. ...
- Compare the printed patterns with the samples above. The first pattern is for ink and the second pattern is for gloss optimizer. ...
- Compares the contents of two files or sets of files. COMP data1 data2 /D /A /L /N=number /C /OFF[LINE data1 Specifies location ...
- Compares the properties of specified domain controllers to determine if they are up to date with each other. The source domain ...
- Compares two files or sets of files and displays the differences between them FC /A /C /L /LBn /N /OFF[LINE /T /U /W /nnnn ...
- Compatibility flag for 16 bit applications. This flag attempts to give the focus to the application. This flag should normally ...
- Compatibility flag for 16 bit applications. This flag fixes divide by zero problems resulting from 2 consecutive timegettime ...
- Compatibility flag for 16 bit applications. This flag fixes window placement problems resulting from themes. Apps calculate ...
- Compatibility flag for 16 bit applications. This flag forces the display mode to 256 colors. It does not change the screen ...
- Compatibility flag for 16 bit applications. This flag prevents the application from syncing when sending DDE messeages. This ...
- Compatibility flag for 16 bit applications. This flag redirects the applications file open calls from %windir%\system to ...
- Compatibility flag for 16 bit applications. This flag tells WOW to strip out most of the NT specific environment vars from ...
- Compatibility flag for 16 bit applications. This flag version lies to the application by turning off a winflag bit specifing ...
- Compatibility flag for 16 bit applications. This flag will prevent the WM_DEVMODECHANGE message from being sent to the application. ...
- Compatibility flag for 16 bit applications. This flag will version lie to the application by changing the parameters in the ...
- Compatibility flag for 16 bit applications. This forces DPMI memory allocations to use ever increasing linear addresses. ...
- CompatibilityDescription is a free-form string defining how the two referenced products interoperate or are compatible, any ...
- Compatible TPM cannot be found on this computer. Verify that this computer has a 1.2 TPM and it is turned on in the BIOS. ...
- Compatible Trusted Platform Module (TPM) cannot be found on this computer. Verify that this computer has a 1.2 TPM and it ...
- Compatitiblity flag for 16 bit applications. This flag will prevent the application from waiting on a spawned process after ...
- Completing this wizard will delete all existing settings and security attributes in this GPO and replace them with the backup's ...
- Completing this wizard will delete all existing settings and security attributes in this Starter GPO and replace them with ...
- Completion is invoked when you type either of the two control characters. The completion function takes the path string to ...
- Complex networking devices often are chassis-based. These chassis allow for enhancement and/or augmentation of their base ...
- Component "%1" from writer "%2" is excluded from backup because it requires a volume that cannot be found on this system. ...
- Component "%1" from writer "%2" is excluded from backup, because it requires volume %3 which is not in the shadow copy set. ...
- Component '%1' setup failed to queue an operation for completion on the next computer restart. This is most likely due to ...
- Component Services (COM+ 1.0) are not installed on this computer. This installation requires Component Services in order ...
- Compressed (zipped) Folders was unable to create the specified directory. Ensure that the directory does not already exist, ...
- Compressed, image, and archive format files that contain other files, such as .zip, .cab, .iso, .wim, and .vhd. This category ...
- Compresses and decompresses audio data conforming to the ETSI-GSM (European Telecommunications Standards Institute-Groupe ...
- Computer ({0}) cannot be managed because it is running an operating system which is not supported by Share and Storage Management. ...
- Computer Account Changed: %1 Target Account Name: %2 Target Domain: %3 Target Account ID: %4 Caller User Name: %5 Caller ...
- Computer Account Created: New Account Name: %1 New Domain: %2 New Account ID: %3 Caller User Name: %4 Caller Domain: %5 Caller ...
- Computer Account Deleted: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
- Computer Control Panel settings configure options that are manually configurable via the Windows Control Panel and affect ...
- Computer is booting, SAC started and initialized. Use the "ch -?" command for information about using channels. Use the "?" ...
- Computer name %2 is not a valid computer name. It may contain illegal characters. Standard names contain letters (a-z, A-Z), ...
- Computer object %1 is already assigned to server %2 in site %3. Are you sure you want to change it to reference the new server ...
- Computer \%1 cannot be managed because the computer was not found on the network. It may be powered down or otherwise not ...
- Computer \%1 cannot be managed because the network is unreachable. Verify that your network cabling is securely attached. ...
- Computer \%1 cannot be managed. %2 Choose 'Connect to another computer' from the Action menu to manage a different computer. ...
- Computers running Windows 2000 Service Pack 4 or earlier must have clocks within 30 minutes of the selected server's clock. ...
- Computers will connect to this instance of AD LDS using specific ports on all of the IP addresses associated with this computer. ...
- Conditional forwarders are DNS servers that this server can use to resolve DNS queries for records in a specific domain. ...