Windows Server 2003

  1. For a ProtectedSpaceExtent that is allocated to a VolumeSet, (i.e. is named in a CIM_VolumeSetBasedOnPSExtent association), ...
  2. For a specified Process Matching Criteria, lists the Resource Allocation Policies that it is a member of. wsrmc /Depends:Pmc ...
  3. For added security, you can require users to press Ctrl+Alt+Delete before logging on. This guarantees that the authentic ...
  4. For additional functionality, like support of additional switch types, serial port emulation, TSP for wave audio and enhanced ...
  5. For advanced Web site developers. Provides the option to choose and customize all components. All options included in the ...
  6. For all IP traffic, always request security using Kerberos trust. Allow unsecured communication with clients that do not ...
  7. For all IP traffic, always require security using Kerberos trust. Do NOT allow unsecured communication with untrusted clients.%0 ...
  8. For assigned applications, whether or not a lightweight install or an actual install is performed 1 = This is not an assigned ...
  9. For bandwidth throttling to function, IIS needs to install Windows Packet Scheduler. Installing Packet Scheduler will cause ...
  10. For compatibility with previous versions of IIS, the filter '%1' was loaded as a global filter from the registry. To control ...
  11. For compatibility with previous versions of IIS, the filter '%1' was loaded as a global filter from the registry. To control ...
  12. For complete terms and conditions governing the use of this product, see the applicable license agreements, which may include ...
  13. For complete terms and conditions governing the use of this product, see the license agreements, which can be found in online ...
  14. For Compressed (zipped) Folders to handle ZIP files correctly, the application associated with them must be Compressed (zipped) ...
  15. For each custom component, specify a compressed cabinet (.CAB) file or a self-extracting executable (.EXE) if applicable. ...
  16. For each Internet service listed below, specify whether you would like to automatically start the service when the server ...
  17. For each selected volume, Remote Storage will create a task on %1 to free all space used by cached remote storage data on ...
  18. For each selected volume, Remote Storage will create a task on %1 to validate remote storage files and recompute statistics ...
  19. For each selected volume, Remote Storage will enter a task of type '%1' in Scheduled Tasks on %2 (with no schedule). Remote ...
  20. For each zone, the Binary and Scripted Behavior security restrictions may be configured to allow only a list of admin-approved ...
  21. For each zone, the Network Protocol Lockdown security restriction may be configured to prevent active content obtained through ...
  22. For encryption and decryption of messages, both a public key and a private key are required. You must provide the password ...
  23. For encryption and decryption of messages, both a public key and a private key are required. You must supply a password for ...
  24. for example, 14:30 for 2:30 PM. /RI interval Specifies the repetition interval in minutes. Valid range: 1 - 599940 minutes. ...
  25. For example, a business might add all the computers in its Seattle office to a domain so that they share the same access ...
  26. For example, a WINS replication partner would use this port to tell this WINS Server to download data that has been updated ...
  27. For example, file-based applications would typically have scope names based on file paths, whereas Web-based applications ...
  28. For example, if you make a purchase on a Web site, that site might send a cookie to your computer that contains your shipping ...
  29. For example, if you select the United States as your region and English as your language, then monetary amounts will appear ...
  30. For example, if you speak most often in Spanish, but the computer programs and files you work with are typically in English, ...
  31. For example, on this screen, select the region of the world closest to where you live, the language you'll use most frequently ...
  32. For example, when you register with Microsoft, your name and address information are stored on Microsoft's secure registration ...
  33. For Help and troubleshooting, go to the Help menu, click Contents and Index, and then look up Troubleshooting in the Index. ...
  34. For help installing your hardware, see Hardware requirements overview in Help and Support Center. Then, when you are finished ...
  35. For help installing your hardware, see hardware requirements overview in Help and Support Center. Then, when you are finished ...
  36. For information about this operation please see the following directory on the target machine(s): %windir%\security\msscw\Logs ...
  37. For information about which settings to use, see your network administrator. After your network connection is properly configured, ...
  38. For information about which settings to use, see your network administrator. When you have reconfigured your network software, ...
  39. For information on enhancing the manageability of your American Power Conversion UPS and upgrade information, please see: ...
  40. For more information about setting up a Routing and Remote Access, deployment scenarios, and troubleshooting, see Help . ...
  41. For more information about setting up a Routing and Remote Access, deployment scenarios, and troubleshooting, see Routing ...
  42. For more information about setting up Routing and Remote Access server, deployment scenarios, and troubleshooting, see Help. ...
  43. For more information on using the Local intranet or Trusted sites zones' inclusion lists, see Managing Internet Explorer ...
  44. For multihomed partners, you need to repeat the process for each IP address on the multihomed server. For more information ...
  45. for on %3 has failed: succeeded on %4 files (%5 bytes), skipped %6 files (%7 bytes), and failed on %8 files (%9 bytes) in ...
  46. for on %3 is done: succeeded on %4 files (%5 bytes), skipped %6 files (%7 bytes), and failed on %8 files (%9 bytes) in %10 ...
  47. for on %3 was cancelled: succeeded on %4 files (%5 bytes), skipped %6 files (%7 bytes), and failed on %8 files (%9 bytes) ...
  48. for on %3 was paused: succeeded on %4 files (%5 bytes), skipped %6 files (%7 bytes), and failed on %8 files (%9 bytes) in ...
  49. for on %3 was suspended: succeeded on %4 files (%5 bytes), skipped %6 files (%7 bytes), and failed on %8 files (%9 bytes) ...
  50. For optimum compatibility with the Microsoft Windows XP operating system, Lotus recommends that you upgrade to Lotus SmartSuite ...
  51. For security reasons, it is strongly recommended that you set a password that the recipient must use to connect to your computer. ...
  52. For security reasons, Windows can not synchronize with the server because your date does not match. Please fix the date and ...
  53. For security reasons, Windows Server 2003 family's Network Monitor captures only network traffic (frames) sent to or from ...
  54. For security, you can lock your display whenever you leave your computer by pressing CTRL+ALT+DEL and clicking Lock Workstation. ...
  55. For security, you should require the recipient to use a password to connect to your computer. Do not use your network Windows ...
  56. For the best experience using the Files and Settings Transfer Wizard, you will want to connect your two computers together. ...
  57. For the following authentication methods, user name and password are required when: - anonymous access is disabled, or - ...
  58. For the Local intranet zone, the security level is set to Medium-Low, which allows your user credentials (name and password) ...
  59. For the operation to be completed, the user needs to logoff and relogon. Couldn't log the user off. Error - %s. Please logoff. ...
  60. For the specified Policy, Lists the Calendar Events and Schedules of which the specified Policy is a member wsrmc /Depends:Pol ...
  61. For up-to-date information about Internet Explorer security zones, go to the Microsoft MSDN Library Web site (http://msd ...
  62. For Windows Installer packages, this is the file system path to the Windows installer package. For ZAP packages, this is ...
  63. For Windows NT only) The WinstationDesktop property specifies either the name of the desktop only or the name of both the ...
  64. Forest trust A forest trust is a transitive trust between two forests that allows users in any of the domains in one forest ...
  65. Forest upgrade has been canceled by user. Status/Consequence Adprep has been stopped. The forest has not been completely ...
  66. Forest-wide authentication Users in the %s forest can have access to all computers in the local forest. This option is preferred ...
  67. Forest-wide authentication Users in the local forest can have access to all computers in the %s forest. This option is preferred ...
  68. Forest-wide authentication Windows will automatically authenticate users from the local forest for all resources in the %s ...
  69. Forest-wide authentication Windows will automatically authenticate users from the specified forest for all resources in the ...
  70. Forest-wide information can only be updated on the domain controller that holds the schema operations master role. Status/Consequence ...
  71. Forest-wide information needs to be updated before the domain-wide information can be updated. User Action Log on to the ...
  72. Forestroot" is not a valid input for STARTNODE in dsquery quota. To find quota specifications in the domain, enter "domainroot". ...
  73. Format cannot run because the volume is in use by another process. Format may run if this volume is dismounted first. ALL ...
  74. Format failed: The volume is too big to be formatted to the specified filesystem. Please use a different filesystem or volume. ...
  75. Format failed: The volume is too small to be formatted to the specified filesystem. Please use a different filesystem or ...