Windows Server 2003

  1. Parameters: Value Description { | forestroot | domainroot} The node where the search will start: forest root, domain root, ...
  2. part Required. Specifies the distinguished name of the directory partition on which you want to create a quota. If the distinguished ...
  3. Partial Data Received} The network transport returned partial data to its client. The remaining data will be sent later. ...
  4. Partial Expedited Data Received} The network transport returned partial data to its client and this data was marked as expedited ...
  5. Partition Error: This version of the Remote Installation Preparation wizard does not support multiple partitions. Be sure ...
  6. Password Hash Audit Event. Password of the following user accessed: Target User Name: %s Target User Domain: %s By user: ...
  7. Password of the following user accessed: Target User Name: %1 Target User Domain: %2 By user: Caller User Name: %3 Caller ...
  8. Password Policy Checking API is called: Caller Username: %1 Caller Domain: %2 Caller Logon ID: %3 Caller Workstation: %4 ...
  9. Password Too Complex} The Windows password is too complex to be converted to a LAN Manager password. The LAN Manager password ...
  10. passwords during the authentication process. For more detail on user authentication, consult the online help. This warning ...
  11. PAStore Engine failed to apply locally cached copy of Active Directory storage IPSec policy on the machine for "%1" with ...
  12. PAStore Engine failed to apply some rules of the active IPSec policy "%1" on the machine with error code: %2. Please run ...
  13. PAStore Engine polled for changes to the Active Directory IPSec policy, detected that Active Directory is not reachable and ...
  14. PAStore Engine polled for changes to the Active Directory IPSec policy, detected that Active Directory is reachable and found ...
  15. PAStore Engine polled for changes to the Active Directory IPSec policy, detected that Active Directory is reachable, found ...
  16. path Specifies the existing NTFS directory where the mount point will reside. VolumeName Specifies the volume name that is ...
  17. PCIController is a superclass for the PCIBridge and PCIDevice classes. These classes model adapters and bridges on a PCI ...
  18. Peeks at a message with a LookupId property that is equal to the specified lookup identifier and has the optional parameters ...
  19. Peeks at the first message in the queue and has the optional parameters WantDestinationQueue (default set to False), WantBody ...
  20. Peeks at the last message in the queue and has the optional parameters WantDestinationQueue (default set to False), WantBody ...
  21. Peeks at the message following a message with a LookupId property that is equal to the specified lookup identifier and has ...
  22. Peeks at the message preceding a message with a LookupId property that is equal to the specified lookup identifier and has ...
  23. Peer with IP address %1 was unable to receive RIP message sent out from interface with IP address %2. The peer might be rebooting, ...
  24. People can reply to your news messages by sending you an e-mail message at the address below-or they may post another news ...
  25. People can use your computer name to call you if your computer name consists of only those characters found on standard European ...
  26. Per Session licenses could not be returned to the Terminal Server Licensing Service. Confirm that all license servers on ...
  27. Per Session licenses have expired and could not be renewed. No further connections will be allowed. Confirm that you have ...
  28. Per user auditing policy set for user: Target user: %1 Policy ID: %2 Category Settings: System: %3 Logon: %4 Object Access ...
  29. Perform initial configuration of a new DNS server, manage forward and reverse lookup zones, update resource records, and ...
  30. Performance counter data collection from the "%1!s!" service has been disabled due to one or more errors generated by the ...
  31. Performance counter data collection from the "%1!s!" service has been disabled for this session due to one or more errors ...
  32. Performance counters for the %1!s! (%2!s!) service were loaded successfully. The Record Data contains the new index values ...
  33. Performance counters for the %1!s! (%2!s!) service were removed successfully. The Record Data contains the new values of ...
  34. Performance Logs and Alerts supports Windows 2000 or later. Check the operating system version on the computer named %s. ...
  35. Performance threshold values have been reached. Trap processing is being quiesed. Further traps will not be sent without ...
  36. Performance threshold values have been set by operator intervention. Current settings indicate performance thresholds have ...
  37. Performance warning: replication was delayed while applying changes to the following object. If this message occurs frequently, ...
  38. Performs conditional processing in batch programs. IF NOT ERRORLEVEL number command IF NOT string1=string2 command IF NOT ...
  39. Performs system restore functions. To stop service, turn off System Restore from the System Restore tab in My Computer->Properties ...
  40. Performs TCP/IP configuration for DHCP clients, including dynamic assignments of IP addresses, specification of the WINS ...
  41. Perhaps you're wondering how the Internet might help you. Do you want to plan a trip? Check out sports scores? Shop online ...
  42. PermanentAddress defines the network address hard coded into an adapter. This 'hard coded' address may be changed via firmware ...
  43. Permission information specifying who can join object %2 to a domain cannot be written because: %1 The computer account will ...
  44. Permissions compatible with pre-Windows 2000 servers will be used with this domain; this will allow anonymous access to domain ...
  45. Permissions on the operating system root directory are insecure. Setup attempted to secure the root directory along with ...
  46. Permissions you set on this page only control access to the share; you might also want to set permissions on individual files ...
  47. Permits only bitmap images for wallpaper. This setting limits the desktop background ("wallpaper") to bitmap (.bmp) files. ...
  48. Permits or prohibits use of the Group Policy tab in property sheets for the Active Directory Users and Computers and Active ...
  49. Permits or prohibits use of this snap-in. If you enable this setting, the snap-in is permitted. If you disable the setting, ...
  50. Permits users to change installation options that typically are available only to system administrators. This setting bypasses ...
  51. Persona Grata commands are inaccessible when Persona Mode is set to Non-Grata. Please change Persona Mode to Grata before ...
  52. Persona Non-Grata commands are inaccessible when Persona Mode is set to Grata. Please change Persona Mode to Non-Grata before ...
  53. Personal Computer architecture Memory Mapped I/O. This class addresses both memory and port I/O resources. The property, ...
  54. Personally identifiable online and physical contact information, as well as to other information linked to an identifiable ...
  55. PFXInFileList - Comma separated PFX input file list EPF - EPF output file %1 - Use CAST 64 encryption %2 - Use CAST 64 encryption ...
  56. PFXInFileList - Comma separated PFX input file list PFXOutFile - PFX output file The password specified on the command line ...
  57. Phone Dialer was unable to find a telephone device or modem to use to dial voice calls. In Control Panel, double-click the ...
  58. Phone: 06 (1) 267-4636 / SMS (mobile): 06 (20) 962-5848 (Send Installation ID SMS message and receive Confirmation ID response.) ...
  59. Physical Disk resource received a notification that the drive letter on the quorum drive was changed from '%1:' to '%2:'. ...
  60. Physical extents are realized on a physical media. This relationship is made explicit by the CIM_RealizesPExtent association. ...
  61. Physical memory can be located on hosting boards, adapter cards, etc. This association explicitly defines this relationship ...
  62. Physical packages contain connectors as well as other physical elements. The CIM_ConnectorOnPackage association makes explicit ...
  63. Pick up the handset and dial (or ask the operator to dial). After dialing is complete, click OK. Listen to handset until ...
  64. Pick up the handset and dial (or ask the operator to dial). Press OK immediately after dialing, then replace the handset. ...
  65. PICSRules files contain rules used to determine whether a site can be viewed. They can utilize PICS labels, and can specify ...
  66. Pictures with check marks will be copied. To rotate a picture or view its properties, click it, and then click the appropriate ...
  67. Piggyback Ack Queued/sec is the rate at which piggybacked acknowledgments are queued. Piggyback acknowledgments are acknowledgments ...
  68. Piggyback Ack Timeouts is the number of times that a piggyback acknowledgment could not be sent because there was no outgoing ...
  69. Pin Read Hits is the percentage of pin read requests that hit the file system cache, i.e., did not require a disk read in ...
  70. Pin Reads/sec is the frequency of reading data into the file system cache preparatory to writing the data back to disk. Pages ...
  71. Ping tries to contact a remote computer on the network. Successfully contacting the computer does not imply that the required ...
  72. Place your stone next to an opponent's stone on a horizontal, vertical, or diagonal line that also has a stone of your color. ...
  73. Please check the Windows documentation about ARC configuration options and your hardware reference manuals for additional ...
  74. Please check the Windows documentation about hardware configuration and your hardware reference manuals for additional information. ...
  75. Please check the Windows documentation about hardware disk configuration and your hardware reference manuals for additional ...