Windows Server 2003

  1. Number of contiguous ProtectedSpaceExtents counted before looping back to the first ProtectedSpaceExtent of the current stripe. ...
  2. Number of days after which an event can be overwritten. Values are: 0 = Any entry can be overwritten when necessary.1.365 ...
  3. Number of downstream Ports on the Hub, including those embedded in the Hub's silicon. Individual USBPorts are associated ...
  4. Number of files and folders in volume "%1" is greater than 65535. Older Macintosh clients may not function correctly in this ...
  5. Number of hard resets issued by the controller. A hard reset returns the device to its initialization or 'boot-up' state. ...
  6. Number of input async framing errors. These can be caused by a noisy transmission line. Using a smaller packet size may help ...
  7. Number of input async overrun errors. These can be caused by the baud rate being faster than the computer can handle, or ...
  8. Number of input compression dictionary flushes. When the data can not be compressed, the compression dictionary is flushed ...
  9. Number of kilobytes of virtual memory currently unused and available. For example, this may be calculated by adding the amount ...
  10. Number of kilobytes of virtual memory. For example, this may be calculated by adding the amount of total RAM to the amount ...
  11. Number of object property values containing Distinguished Names sent to outbound replication partners. DN-values, such as ...
  12. Number of object property values received from inbound replication partners that are Distinguished Names; i.e., that reference ...
  13. Number of objects looked at by outbound replication that were determined to have no updates that the outbound partner did ...
  14. Number of output compression dictionary flushes. When the data can not be compressed, the compression dictionary is flushed ...
  15. Number of SCSI retries that have occurred since last hard or soft reset related to the controlled Device. The time of last ...
  16. Number of SCSI timeouts that have occurred since last hard or soft reset related to the controlled Device. The time of last ...
  17. Number of search suboperations per second. One search operation is made up of many sub operations. A sub operation roughly ...
  18. Number of Security Descriptor Propagation suboperations per second. One Security Descriptor Propagation operation is made ...
  19. Number of soft resets issued by the controller. A soft reset does not completely clear current device state and/or data. ...
  20. o {dn | rdn} Specifies the output format. The default format is distinguished name (dn). -part Finds partition specifications ...
  21. Object "%1" cannot be deleted because an open window is displaying its properties. To delete this object, close that window ...
  22. Object %1 is a Trusted Domain object. To remove trusts use the Active Directory Domains and Trusts snapin. Do you want to ...
  23. Object %2 is a container and contains other objects. Are you sure you want to delete object %2 and all of the objects in ...
  24. Object %2 is a container and contains other objects. Are you sure you want to delete object %2 and the objects it contains? ...
  25. Object Access Attempt: Object Server: %1 Handle ID: %2 Object Type: %3 Process ID: %4 Image File Name: %5 Accesses: %6 Access ...
  26. Object being moved across-domains is already known to be deleted by the destination server. The source server does not have ...
  27. Object Open for Delete: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: {%5,%6} Process ID: ...
  28. Object Open: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: {%5,%6} Process ID: %7 Image File ...
  29. Object Open: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: {%5,%6} Process ID: %7 Process ...
  30. Object Operation: Object Server: %1 Operation Type: %2 Object Type: %3 Object Name: %4 Handle ID: %5 Primary User Name: %6 ...
  31. ObjectId - ObjectId to display or to add display name DisplayName - Display Name to store in DS %1 - delete display name ...
  32. Obtain a free trial personal digital ID from VeriSign . Use this ID to positively identify yourself when you send secure ...
  33. Occasionally, Microsoft allows carefully selected partners to offer its customers products and services by mail. Do you want ...
  34. Occasionally, Microsoft allows carefully selected partners to offer its customers their products and services by mail. Do ...
  35. Of %1 files within %2 directories %3 are compressed and %4 are not compressed. %5 total bytes of data are stored in %6 bytes. ...
  36. off-line read scanning implemented bit) - If this bit is cleared to zero, the device does not support off-line read scanning. ...
  37. Offers the latest critical and security updates, device drivers, and other features that are available for your Windows computer. ...
  38. Offline changes to '%1' have not been synchronized. By deleting the offline version, these changes will be lost. Do you wish ...
  39. Offline files are local copies of network files that you specifically made available offline, enabling you to access them ...
  40. Offline files cannot be encrypted or decrypted now because Windows is currently encrypting/decrypting them. Try again later ...
  41. Offline items were not updated because a connection to the Internet could not be made because File Sharing for Microsoft ...
  42. Offline pages are Web pages that are stored on your computer so you can view them without being connected to the Internet. ...
  43. Often, a cooling device is installed in a package such as a chassis or a rack, not for a specific device, but to assist in ...
  44. Often, a temperature sensor is installed in a package such as a chassis or a rack, not to measure any particular device, ...
  45. Often, an alarm device is installed as part of a package, not to indicate issues with any particular logical device or physical ...
  46. OID "%1" defined for object %2 conflicts with the schema extensions needed for Windows 2003. Status/Consequence Adprep will ...
  47. On a front-end server, the Exchange System Attendant is required only to make configuration changes to the server (including ...
  48. On domain controllers this service enables users to log on to the network using the Kerberos authentication protocol. If ...
  49. On input, RequestLength is the length (in octets) of the Descriptor that should be returned. If this value is less than the ...
  50. On networks that use Transmission Control Protocol/Internet Protocol (TCP/IP), this server can use DNS to translate computer ...
  51. On TCP/IP networks, client computers must be associated with IP addresses. Windows uses DHCP to dynamically assign IP addresses ...
  52. On the File Locations screen, if you imported an .ins file, the settings from that file are the initial values for this IEAK ...
  53. On the next few screens, you can tell Windows how to display text, dates, and numbers based upon your language preferences, ...
  54. On the next screen you will need to either select Brooktrout Technology from your address book, or type in the fax number: ...
  55. On the Security tab, select the Web content zone you want to adjust: Internet, Local intranet, Trusted sites, or Restricted ...
  56. On Windows 2000/Windows Server 2003 family If an incompatible Windows NT 4.0 driver is being used as the primary driver for ...
  57. On-demand publishing points cannot be used for push distribution. Either enter an alternate source for the On-demand publishing ...
  58. On-Screen Keyboard is intended to provide a minimum level of functionality for users with limited mobility. Users with limited ...
  59. On-Screen Keyboard provides a minimum level of functionality for mobility-impaired users. Mobility-impaired users will need ...
  60. On-Screen Keyboard was originally produced for Microsoft by Madentec Limited. For more information about Madentec and a list ...
  61. Once a group is deleted, even creating an identically named group in the future will not restore access to resources which ...
  62. Once applied, any security descriptors for registry or file system objects in these security templates cannot be removed ...
  63. Once encryption is enabled, it cannot be disabled. Make sure you have a current Emergency Repair Disk before continuing. ...
  64. Once it's ejected, flip the media in library %s. The Removable Storage Manager has completed identification of the other ...
  65. Once it's ejected, flip the media in library %s. The Removable Storage Manager must write a Free media label on the other ...
  66. Once license server activation is completed successfully, Terminal Server Client Access licenses can be installed and deployed. ...
  67. Once you finish setting up Windows, you can run the Product Activation Wizard by clicking Activate Windows on the Start menu. ...
  68. One Briefcase cannot be added to another. To add files from another Briefcase, select specific files and drag them to this ...
  69. One of the backup criteria for determining a file type is the result of the MIME sniff. By examining (or sniffing) a file, ...
  70. One of the certificates in the certificate chain of the server certificate for instance '%1' has an invalid signature. For ...
  71. One of the components that Windows needs to continue setup could not be installed. %1 If you are installing from a CD, there ...
  72. One of the files in the registry database had to be recovered by use of a log or alternate copy. The recovery was successful. ...
  73. One of the IP/Port combinations for site '%1' has already be configured to be used by another site. The other site's SSL ...
  74. One of the IP/Port combinations for site '%1' has already been configured to be used by another program. The other program's ...
  75. One of the objects you are trying to edit has changed recently. Please use the "rescan" command to scan your configuration ...