File name: | rshx32.dll.mui |
Size: | 10240 byte |
MD5: | fe19a0b72558bac7fd7407ce2ae2b263 |
SHA1: | 43195e44567dfb7e2bf0756043d04ef7b871ec09 |
SHA256: | 2410980fe90d381e771e312caa0305d249275a05c92581239947f8bc022d4790 |
Operating systems: | Windows 10 |
Extension: | MUI |
If an error occurred or the following message in English (U.S.) language and you cannot find a solution, than check answer in English. Table below helps to know how correctly this phrase sounds in English.
id | English (U.S.) | English |
---|---|---|
2 | Security | Security |
3 | None | None |
9 | %1 (%2) | %1 (%2) |
10 | Unknown error (0x%1!08x!) | Unknown error (0x%1!08x!) |
11 | You do not have permission to read the contents of directory %1. Do you want to replace the directory permissions with permissions granting you Full Control? All permissions will be replaced if you press Yes. |
You do not have permission to read the contents of directory %1. Do you want to replace the directory permissions with permissions granting you Full Control? All permissions will be replaced if you press Yes. |
12 | Changing ownership of: | Changing ownership of: |
13 | Setting permissions on: | Setting permissions on: |
14 | Setting audit information on: | Setting audit information on: |
15 | Setting security information on: | Setting security information on: |
16 | Full control | Full control |
17 | Read | Read |
18 | Write | Write |
19 | Traverse / execute | Traverse / execute |
20 | Modify | Modify |
21 | Read, write & execute | Read, write & execute |
22 | Write & execute | Write & execute |
23 | Read & execute | Read & execute |
24 | List folder contents | List folder contents |
32 | Delete | Delete |
33 | Read permissions | Read permissions |
34 | Change permissions | Change permissions |
35 | Take ownership | Take ownership |
36 | Synchronize | Synchronize |
38 | List folder / read data | List folder / read data |
39 | Create files / write data | Create files / write data |
40 | Create folders / append data | Create folders / append data |
41 | Read extended attributes | Read extended attributes |
42 | Write extended attributes | Write extended attributes |
43 | Traverse folder / execute file | Traverse folder / execute file |
44 | Delete subfolders and files | Delete subfolders and files |
45 | Read attributes | Read attributes |
46 | Write attributes | Write attributes |
47 | Create named pipe | Create named pipe |
48 | This folder only | This folder only |
49 | This folder, subfolders and files | This folder, subfolders and files |
50 | This folder and subfolders | This folder and subfolders |
51 | This folder and files | This folder and files |
52 | Subfolders and files only | Subfolders and files only |
53 | Subfolders only | Subfolders only |
54 | Files only | Files only |
55 | Remotely setting permissions on the folder at the root of a share removes all inherited permissions from the root folder and all subfolders. To set permissions without removing the inherited permissions, click No and either change the permissions on a child folder or make the change while logged in locally. Do you want to continue? |
Remotely setting permissions on the folder at the root of a share removes all inherited permissions from the root folder and all subfolders. To set permissions without removing the inherited permissions, click No and either change the permissions on a child folder or make the change while logged in locally. Do you want to continue? |
56 | Remotely setting auditing entries on the folder at the root of a share removes all inherited auditing entries from the root folder and all subfolders. To set auditing entries without removing the inherited auditing entries, click No and either change the auditing entries on a child folder or make the change while logged on locally. Do you want to continue? |
Remotely setting auditing entries on the folder at the root of a share removes all inherited auditing entries from the root folder and all subfolders. To set auditing entries without removing the inherited auditing entries, click No and either change the auditing entries on a child folder or make the change while logged on locally. Do you want to continue? |
59 | Permissions editor for files and folders | Permissions editor for files and folders |
60 | File Permissions | File Permissions |
64 | ||
65 | Manage this printer | Manage this printer |
66 | Manage documents | Manage documents |
72 | This printer only | This printer only |
73 | Documents only | Documents only |
74 | This printer and documents | This printer and documents |
81 | Stopping the propagation of central access policy settings leads to an inconsistent state, in which some objects have the settings but others don't. If you made the change by mistake, you should apply the correct change immediately to achieve a consistent state. | Stopping the propagation of central access policy settings leads to an inconsistent state, in which some objects have the settings but others don't. If you made the change by mistake, you should apply the correct change immediately to achieve a consistent state. |
82 | If you stop the propagation of permission settings, it might lead to an inconsistent state where objects have different settings. If you made this change by mistake, you should apply the correct permission settings immediately. | If you stop the propagation of permission settings, it might lead to an inconsistent state where objects have different settings. If you made this change by mistake, you should apply the correct permission settings immediately. |
83 | Stopping the propagation of auditing settings leads to an inconsistent state, in which some objects have the settings but others don't. If you made the change by mistake, you should apply the correct change immediately to achieve a consistent state. | Stopping the propagation of auditing settings leads to an inconsistent state, in which some objects have the settings but others don't. If you made the change by mistake, you should apply the correct change immediately to achieve a consistent state. |
84 | If you stop the propagation of owner settings, it might lead to an inconsistent state where objects have different settings. If you made this change by mistake, you should apply the correct permission settings immediately. | If you stop the propagation of owner settings, it might lead to an inconsistent state where objects have different settings. If you made this change by mistake, you should apply the correct permission settings immediately. |
85 | You are about to change permissions on the root directory of the startup disk. This can reduce the security of your computer and cause users to have problems accessing files. Do you want to continue? | You are about to change permissions on the root directory of the startup disk. This can reduce the security of your computer and cause users to have problems accessing files. Do you want to continue? |
86 | You are about to change the permission settings on system folders. This can reduce the security of your computer and cause users to have problems accessing files. Do you want to continue? | You are about to change the permission settings on system folders. This can reduce the security of your computer and cause users to have problems accessing files. Do you want to continue? |
87 | Windows Security | Windows Security |
88 | Share | Share |
89 | Full Control | Full Control |
90 | Change | Change |
93 | Failed to enumerate objects in the container. Access is denied. | Failed to enumerate objects in the container. Access is denied. |
File Description: | Security Shell Extension |
File Version: | 10.0.15063.0 (WinBuild.160101.0800) |
Company Name: | Microsoft Corporation |
Internal Name: | rshx32.dll |
Legal Copyright: | © Microsoft Corporation. All rights reserved. |
Original Filename: | rshx32.dll.mui |
Product Name: | Microsoft® Windows® Operating System |
Product Version: | 10.0.15063.0 |
Translation: | 0x409, 1200 |