Windows Server 2003
- For a ProtectedSpaceExtent that is allocated to a VolumeSet, (i.e. is named in a CIM_VolumeSetBasedOnPSExtent association), ...
- For a specified Process Matching Criteria, lists the Resource Allocation Policies that it is a member of. wsrmc /Depends:Pmc ...
- For added security, you can require users to press Ctrl+Alt+Delete before logging on. This guarantees that the authentic ...
- For additional functionality, like support of additional switch types, serial port emulation, TSP for wave audio and enhanced ...
- For advanced Web site developers. Provides the option to choose and customize all components. All options included in the ...
- For all IP traffic, always request security using Kerberos trust. Allow unsecured communication with clients that do not ...
- For all IP traffic, always require security using Kerberos trust. Do NOT allow unsecured communication with untrusted clients.%0 ...
- For assigned applications, whether or not a lightweight install or an actual install is performed 1 = This is not an assigned ...
- For bandwidth throttling to function, IIS needs to install Windows Packet Scheduler. Installing Packet Scheduler will cause ...
- For compatibility with previous versions of IIS, the filter '%1' was loaded as a global filter from the registry. To control ...
- For compatibility with previous versions of IIS, the filter '%1' was loaded as a global filter from the registry. To control ...
- For complete terms and conditions governing the use of this product, see the applicable license agreements, which may include ...
- For complete terms and conditions governing the use of this product, see the license agreements, which can be found in online ...
- For Compressed (zipped) Folders to handle ZIP files correctly, the application associated with them must be Compressed (zipped) ...
- For each custom component, specify a compressed cabinet (.CAB) file or a self-extracting executable (.EXE) if applicable. ...
- For each Internet service listed below, specify whether you would like to automatically start the service when the server ...
- For each selected volume, Remote Storage will create a task on %1 to free all space used by cached remote storage data on ...
- For each selected volume, Remote Storage will create a task on %1 to validate remote storage files and recompute statistics ...
- For each selected volume, Remote Storage will enter a task of type '%1' in Scheduled Tasks on %2 (with no schedule). Remote ...
- For each zone, the Binary and Scripted Behavior security restrictions may be configured to allow only a list of admin-approved ...
- For each zone, the Network Protocol Lockdown security restriction may be configured to prevent active content obtained through ...
- For encryption and decryption of messages, both a public key and a private key are required. You must provide the password ...
- For encryption and decryption of messages, both a public key and a private key are required. You must supply a password for ...
- for example, 14:30 for 2:30 PM. /RI interval Specifies the repetition interval in minutes. Valid range: 1 - 599940 minutes. ...
- For example, a business might add all the computers in its Seattle office to a domain so that they share the same access ...
- For example, a WINS replication partner would use this port to tell this WINS Server to download data that has been updated ...
- For example, file-based applications would typically have scope names based on file paths, whereas Web-based applications ...
- For example, if you make a purchase on a Web site, that site might send a cookie to your computer that contains your shipping ...
- For example, if you select the United States as your region and English as your language, then monetary amounts will appear ...
- For example, if you speak most often in Spanish, but the computer programs and files you work with are typically in English, ...
- For example, on this screen, select the region of the world closest to where you live, the language you'll use most frequently ...
- For example, when you register with Microsoft, your name and address information are stored on Microsoft's secure registration ...
- For Help and troubleshooting, go to the Help menu, click Contents and Index, and then look up Troubleshooting in the Index. ...
- For help installing your hardware, see Hardware requirements overview in Help and Support Center. Then, when you are finished ...
- For help installing your hardware, see hardware requirements overview in Help and Support Center. Then, when you are finished ...
- For information about this operation please see the following directory on the target machine(s): %windir%\security\msscw\Logs ...
- For information about which settings to use, see your network administrator. After your network connection is properly configured, ...
- For information about which settings to use, see your network administrator. When you have reconfigured your network software, ...
- For information on enhancing the manageability of your American Power Conversion UPS and upgrade information, please see: ...
- For more information about setting up a Routing and Remote Access, deployment scenarios, and troubleshooting, see Help . ...
- For more information about setting up a Routing and Remote Access, deployment scenarios, and troubleshooting, see Routing ...
- For more information about setting up Routing and Remote Access server, deployment scenarios, and troubleshooting, see Help. ...
- For more information on using the Local intranet or Trusted sites zones' inclusion lists, see Managing Internet Explorer ...
- For multihomed partners, you need to repeat the process for each IP address on the multihomed server. For more information ...
- for on %3 has failed: succeeded on %4 files (%5 bytes), skipped %6 files (%7 bytes), and failed on %8 files (%9 bytes) in ...
- for on %3 is done: succeeded on %4 files (%5 bytes), skipped %6 files (%7 bytes), and failed on %8 files (%9 bytes) in %10 ...
- for on %3 was cancelled: succeeded on %4 files (%5 bytes), skipped %6 files (%7 bytes), and failed on %8 files (%9 bytes) ...
- for on %3 was paused: succeeded on %4 files (%5 bytes), skipped %6 files (%7 bytes), and failed on %8 files (%9 bytes) in ...
- for on %3 was suspended: succeeded on %4 files (%5 bytes), skipped %6 files (%7 bytes), and failed on %8 files (%9 bytes) ...
- For optimum compatibility with the Microsoft Windows XP operating system, Lotus recommends that you upgrade to Lotus SmartSuite ...
- For security reasons, it is strongly recommended that you set a password that the recipient must use to connect to your computer. ...
- For security reasons, Windows can not synchronize with the server because your date does not match. Please fix the date and ...
- For security reasons, Windows Server 2003 family's Network Monitor captures only network traffic (frames) sent to or from ...
- For security, you can lock your display whenever you leave your computer by pressing CTRL+ALT+DEL and clicking Lock Workstation. ...
- For security, you should require the recipient to use a password to connect to your computer. Do not use your network Windows ...
- For the best experience using the Files and Settings Transfer Wizard, you will want to connect your two computers together. ...
- For the following authentication methods, user name and password are required when: - anonymous access is disabled, or - ...
- For the Local intranet zone, the security level is set to Medium-Low, which allows your user credentials (name and password) ...
- For the operation to be completed, the user needs to logoff and relogon. Couldn't log the user off. Error - %s. Please logoff. ...
- For the specified Policy, Lists the Calendar Events and Schedules of which the specified Policy is a member wsrmc /Depends:Pol ...
- For up-to-date information about Internet Explorer security zones, go to the Microsoft MSDN Library Web site (http://msd ...
- For Windows Installer packages, this is the file system path to the Windows installer package. For ZAP packages, this is ...
- For Windows NT only) The WinstationDesktop property specifies either the name of the desktop only or the name of both the ...
- Forest trust A forest trust is a transitive trust between two forests that allows users in any of the domains in one forest ...
- Forest upgrade has been canceled by user. Status/Consequence Adprep has been stopped. The forest has not been completely ...
- Forest-wide authentication Users in the %s forest can have access to all computers in the local forest. This option is preferred ...
- Forest-wide authentication Users in the local forest can have access to all computers in the %s forest. This option is preferred ...
- Forest-wide authentication Windows will automatically authenticate users from the local forest for all resources in the %s ...
- Forest-wide authentication Windows will automatically authenticate users from the specified forest for all resources in the ...
- Forest-wide information can only be updated on the domain controller that holds the schema operations master role. Status/Consequence ...
- Forest-wide information needs to be updated before the domain-wide information can be updated. User Action Log on to the ...
- Forestroot" is not a valid input for STARTNODE in dsquery quota. To find quota specifications in the domain, enter "domainroot". ...
- Format cannot run because the volume is in use by another process. Format may run if this volume is dismounted first. ALL ...
- Format failed: The volume is too big to be formatted to the specified filesystem. Please use a different filesystem or volume. ...
- Format failed: The volume is too small to be formatted to the specified filesystem. Please use a different filesystem or ...