Windows Server 2003
- Number of contiguous ProtectedSpaceExtents counted before looping back to the first ProtectedSpaceExtent of the current stripe. ...
- Number of days after which an event can be overwritten. Values are: 0 = Any entry can be overwritten when necessary.1.365 ...
- Number of downstream Ports on the Hub, including those embedded in the Hub's silicon. Individual USBPorts are associated ...
- Number of files and folders in volume "%1" is greater than 65535. Older Macintosh clients may not function correctly in this ...
- Number of hard resets issued by the controller. A hard reset returns the device to its initialization or 'boot-up' state. ...
- Number of input async framing errors. These can be caused by a noisy transmission line. Using a smaller packet size may help ...
- Number of input async overrun errors. These can be caused by the baud rate being faster than the computer can handle, or ...
- Number of input compression dictionary flushes. When the data can not be compressed, the compression dictionary is flushed ...
- Number of kilobytes of virtual memory currently unused and available. For example, this may be calculated by adding the amount ...
- Number of kilobytes of virtual memory. For example, this may be calculated by adding the amount of total RAM to the amount ...
- Number of object property values containing Distinguished Names sent to outbound replication partners. DN-values, such as ...
- Number of object property values received from inbound replication partners that are Distinguished Names; i.e., that reference ...
- Number of objects looked at by outbound replication that were determined to have no updates that the outbound partner did ...
- Number of output compression dictionary flushes. When the data can not be compressed, the compression dictionary is flushed ...
- Number of SCSI retries that have occurred since last hard or soft reset related to the controlled Device. The time of last ...
- Number of SCSI timeouts that have occurred since last hard or soft reset related to the controlled Device. The time of last ...
- Number of search suboperations per second. One search operation is made up of many sub operations. A sub operation roughly ...
- Number of Security Descriptor Propagation suboperations per second. One Security Descriptor Propagation operation is made ...
- Number of soft resets issued by the controller. A soft reset does not completely clear current device state and/or data. ...
- o {dn | rdn} Specifies the output format. The default format is distinguished name (dn). -part Finds partition specifications ...
- Object "%1" cannot be deleted because an open window is displaying its properties. To delete this object, close that window ...
- Object %1 is a Trusted Domain object. To remove trusts use the Active Directory Domains and Trusts snapin. Do you want to ...
- Object %2 is a container and contains other objects. Are you sure you want to delete object %2 and all of the objects in ...
- Object %2 is a container and contains other objects. Are you sure you want to delete object %2 and the objects it contains? ...
- Object Access Attempt: Object Server: %1 Handle ID: %2 Object Type: %3 Process ID: %4 Image File Name: %5 Accesses: %6 Access ...
- Object being moved across-domains is already known to be deleted by the destination server. The source server does not have ...
- Object Open for Delete: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: {%5,%6} Process ID: ...
- Object Open: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: {%5,%6} Process ID: %7 Image File ...
- Object Open: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: {%5,%6} Process ID: %7 Process ...
- Object Operation: Object Server: %1 Operation Type: %2 Object Type: %3 Object Name: %4 Handle ID: %5 Primary User Name: %6 ...
- ObjectId - ObjectId to display or to add display name DisplayName - Display Name to store in DS %1 - delete display name ...
- Obtain a free trial personal digital ID from VeriSign . Use this ID to positively identify yourself when you send secure ...
- Occasionally, Microsoft allows carefully selected partners to offer its customers products and services by mail. Do you want ...
- Occasionally, Microsoft allows carefully selected partners to offer its customers their products and services by mail. Do ...
- Of %1 files within %2 directories %3 are compressed and %4 are not compressed. %5 total bytes of data are stored in %6 bytes. ...
- off-line read scanning implemented bit) - If this bit is cleared to zero, the device does not support off-line read scanning. ...
- Offers the latest critical and security updates, device drivers, and other features that are available for your Windows computer. ...
- Offline changes to '%1' have not been synchronized. By deleting the offline version, these changes will be lost. Do you wish ...
- Offline files are local copies of network files that you specifically made available offline, enabling you to access them ...
- Offline files cannot be encrypted or decrypted now because Windows is currently encrypting/decrypting them. Try again later ...
- Offline items were not updated because a connection to the Internet could not be made because File Sharing for Microsoft ...
- Offline pages are Web pages that are stored on your computer so you can view them without being connected to the Internet. ...
- Often, a cooling device is installed in a package such as a chassis or a rack, not for a specific device, but to assist in ...
- Often, a temperature sensor is installed in a package such as a chassis or a rack, not to measure any particular device, ...
- Often, an alarm device is installed as part of a package, not to indicate issues with any particular logical device or physical ...
- OID "%1" defined for object %2 conflicts with the schema extensions needed for Windows 2003. Status/Consequence Adprep will ...
- On a front-end server, the Exchange System Attendant is required only to make configuration changes to the server (including ...
- On domain controllers this service enables users to log on to the network using the Kerberos authentication protocol. If ...
- On input, RequestLength is the length (in octets) of the Descriptor that should be returned. If this value is less than the ...
- On networks that use Transmission Control Protocol/Internet Protocol (TCP/IP), this server can use DNS to translate computer ...
- On TCP/IP networks, client computers must be associated with IP addresses. Windows uses DHCP to dynamically assign IP addresses ...
- On the File Locations screen, if you imported an .ins file, the settings from that file are the initial values for this IEAK ...
- On the next few screens, you can tell Windows how to display text, dates, and numbers based upon your language preferences, ...
- On the next screen you will need to either select Brooktrout Technology from your address book, or type in the fax number: ...
- On the Security tab, select the Web content zone you want to adjust: Internet, Local intranet, Trusted sites, or Restricted ...
- On Windows 2000/Windows Server 2003 family If an incompatible Windows NT 4.0 driver is being used as the primary driver for ...
- On-demand publishing points cannot be used for push distribution. Either enter an alternate source for the On-demand publishing ...
- On-Screen Keyboard is intended to provide a minimum level of functionality for users with limited mobility. Users with limited ...
- On-Screen Keyboard provides a minimum level of functionality for mobility-impaired users. Mobility-impaired users will need ...
- On-Screen Keyboard was originally produced for Microsoft by Madentec Limited. For more information about Madentec and a list ...
- Once a group is deleted, even creating an identically named group in the future will not restore access to resources which ...
- Once applied, any security descriptors for registry or file system objects in these security templates cannot be removed ...
- Once encryption is enabled, it cannot be disabled. Make sure you have a current Emergency Repair Disk before continuing. ...
- Once it's ejected, flip the media in library %s. The Removable Storage Manager has completed identification of the other ...
- Once it's ejected, flip the media in library %s. The Removable Storage Manager must write a Free media label on the other ...
- Once license server activation is completed successfully, Terminal Server Client Access licenses can be installed and deployed. ...
- Once you finish setting up Windows, you can run the Product Activation Wizard by clicking Activate Windows on the Start menu. ...
- One Briefcase cannot be added to another. To add files from another Briefcase, select specific files and drag them to this ...
- One of the backup criteria for determining a file type is the result of the MIME sniff. By examining (or sniffing) a file, ...
- One of the certificates in the certificate chain of the server certificate for instance '%1' has an invalid signature. For ...
- One of the components that Windows needs to continue setup could not be installed. %1 If you are installing from a CD, there ...
- One of the files in the registry database had to be recovered by use of a log or alternate copy. The recovery was successful. ...
- One of the IP/Port combinations for site '%1' has already be configured to be used by another site. The other site's SSL ...
- One of the IP/Port combinations for site '%1' has already been configured to be used by another program. The other program's ...
- One of the objects you are trying to edit has changed recently. Please use the "rescan" command to scan your configuration ...