Hacked By AnonymousFox

Current Path : C:/Windows/System32/en-US/
Upload File :
Current File : C:/Windows/System32/en-US/rastls.dll.mui

MZ@	!L!This program cannot be run in DOS mode.

$<ߵRRRЫRЫPRRichRPEL!
Z

@ W8.rdata@@.rsrc` X@@Y.1
T88Y.1$8.rdata8x.rdata$zzzdbg p.rsrc$01p%R.rsrc$02 we8Rjl%nr^ϭkY.1h8P(@Xepfhnotuv0H`x	
LMek w8xPyh~							(	8	H	X	h	x											(	8	H	Xp%(&(4<*+,&D3$56l;hA$EH<DNLS@YH_ hahf$jJpjkTXk(lm tMUIQrat8
jeL6Q\MUIen-USȀ	Enter CredentialsMS Shell DlgPUP
f2&User name:P>cP
x2&Password:P>uP
2&Logon domain:P>PC2OKP~2CancelȐ,}Network Security AlertMS Shell DlgP&
Windows can't verify the server's identityP2-@PjD&etailsP&l=DetailsPi<&ConnectPi<&Don't connect@dPCertificate details!@nA(Please wait...MS Shell DlgP3
aAccessing smart card ...P
lPAȀAdd EAPMS Shell DlgPt&Authentication methods:PkPj2OKP2CancelȀ@NConfigure Certificate SelectionMS Shell DlgP72OKP72CancelP,|P
Certificate &IssuerP Select One or multiple certificates issuers to be used for the certificate0P2VSysTreeView32P,P
Extended Key &Usage (EKU)PYou can select "All Purpose" EKU or "Client Auth and other EKUs" or "Any purpose and other EKUs" or a combination of these.P
All &PurposePiPx
C&lient AuthenticationPdand the following EKUs:PPPSysListView32ClientAuthListPh2&AddPh2&RemovePiPd
A&nyPurposePdand the following EKUs:PPPSysListView32AnyPurposeListP2A&ddP2Re&movePConfigure Certificate SelectionP%sPAȀSelect EKUsMS Shell DlgPSelect the EKUs from the &list below:
P jSysListView32EKUListP2&AddPN2&EditP2&RemovePP2OKP2CancelȀxAdd/Edit EKUMS Shell DlgPEnter the &name of the EKU:P P6Enter the EKU &OID:PB!Ph_2"OKP_2CancelȀEnter PasswordMS Shell DlgP	%sP-Enter the password for the selected user certificateP	 QzUser Name:Pc P	/Q|Issuer:Pd/P	AQ~Expiration date:PdAP	TThe certificate you have selected for authentication has Strong Private Key protection. To use this certificate, please enter the password below:P	ld#P	&xP!}$The password entered was incorrect. Please try againP2OKP2CancelȀGSmart Card or other Certificate PropertiesMS Shell DlgP2When connecting:	P
Use my &smart card	P
Use a &certificate on this computerP+
Use si&mple certificate selection (Recommended)P:&AdvancedP?$P
>&Verify the server's identity by validating the certificate PKC&onnect to these servers (examples:srv1;srv2;.*\.srv3\.com):@`dNServer namesP`PvTrusted &Root Certification Authorities:P
aSysListView32List1PMVi&ew Certificate%PHDon't &prompt user to authorize new servers or trusted certification authorities.$P
Use a &different user name for the connectionP,2OKP,2CancelȀSmart Card or other Certificate PropertiesMS Shell DlgPThis server identifies itself to callers before the connection is completed. Select the certificate that you want it to use as proof of identity.P(QACertificate &issued to:!P_&@P9QzFriendly name:P_9{PKQ|Issuer:P_K}P]Q~Expiration date:P_]Po2OKPo2CancelȀ
Select CertificateMS Shell DlgPx&User name on certificate:!PyP"QzFriendly name:P["{P4Q|Issuer:P[4}PFQ~Expiration date:P[FPTConnection u&ser name:P^PXq2OKPq2CancelPq;&View CertificatePAȀJProtected EAP PropertiesMS Shell DlgPWhen connecting:P$P
&Verify the server's identity by validating the certificate P$C&onnect to these servers (examples:srv1;srv2;.*\.srv3\.com):@9dNServer namesP9POTrusted &Root Certification Authorities:P
YWSysListView32List1P

No&tifications before connecting:!P
-GP&Select Authentication Method:!P-P6&Configure...%P
Enable &Fast Reconnect%P
I&Disconnect if server does not present cryptobinding TLV%P
_
JEnable &Identity Privacy@g
_
OIdentity Privacy usernamePg
qKP42OKP42CancelȀProtected EAP PropertiesMS Shell DlgPThis server identifies itself to callers before the connection is completed. Select the certificate that you want it to use as proof of identity.P(QACertificate &issued to:!Pa&-@P9QzFriendly name:P_9{PKQ|Issuer:P_K}P]Q~Expiration date:P_]
Pl
Enable &Fast ReconnectPyEap &TypesP.P2Move &UpP2Move &DownP2&AddP=2&EditPr2&RemoveP2OKP2CancelȀ Configure Protected EAP PropertiesMS Shell DlgPmP
Select the certificate the server should use to prove its identity to the client. This certificate will override the certificate selected for Protected EAP in Remote Access Policy.P
+QACertificate &issued to:!Pa+-@P
>QzFriendly name:P_>{P
PQ|Issuer:P_P}P
bQ~Expiration date:P_b
Pu
Enable &Fast ReconnectP
Disconnect &Clients without CryptobindingPEap &TypesP.P2Move &UpP2Move &DownP2&AddP=2&EditPr2&RemoveP2OKP2CancelȀ Edit Protected EAP PropertiesMS Shell DlgPmP
Select the certificate the server should use to prove its identity to the client. A certificate that is configured for Protected EAP in Connection Request Policy will override this certificate.P
+QACertificate &issued to:!Pa+-@P
>QzFriendly name:P_>{P
PQ|Issuer:P_P}P
bQ~Expiration date:P_b
Pu
Enable &Fast ReconnectP
Disconnect &Clients without CryptobindingPEap &TypesP.P2Move &UpP2Move &DownP2&AddP=2&EditPr2&RemoveP2OKP2CancelNetwork Security AlertCannot configure EAP
Error 0x%xConnect %ws
netcfg.hlp/Select a certificate to complete configuration.Connect
Unknown Error20rEKU was selected in either Client Auth or Any Purpose EKU List, remove it from there before removing from the list:Specified EKU name already exists, select a different nameRoot Certification Authorities&Intermediate Certification Authorities6Don't ask user to authorize new servers or trusted CAs@Tell user if the server name or root certificate isn't specified4Tell user if the server's identity can't be verifiedFIssued to: %ws

Issued by: %ws

Valid from %ws to %ws

Thumbprint: %wsaWe don't have enough info to validate the server. You can still connect if you trust this server.YIf you expect to find your organization's network in this location, go ahead and connect.Connection user namePasswordServer thumbprint: %wsIssuer thumbprint: %wscIf you choose to connect to specific servers, you must specify server names separated by semicolon.aIf you choose to verify server certificate, you must select a trusted root certificate authority.#Unable to show certificate Details.:Select an authentication method to complete configuration.Select smartcardValidate Identity Privacy NameThe name cannot be used. Names may not consist entirely of periods and/or spaces, or contain these characters: \/"[]:|<>+=;,?*@PinSmartCard UsernamePAChoose a certificateContinue connecting?Enter the passwordContinue connecting to %1?OKConnect
Don't connectInsert a smart cardReading smart cardReading certificate storeShow certificate detailsHide certificate detailsSmart Card or other certificateProtected EAP (PEAP)Sign inPP@PPTpptpdkError

 Information

PRasTls authentication failed event

TRasTls authentication succeeded event

XRasTls authentication in progress event

0Operational Channel

lAuthentication succeeded for EAP method type %1.

Authentication failed for EAP method type %1. The error was %2.

Authentication failed for EAP method type %1 due to a revoked certificate. The error was %2.

Authentication failed for EAP method type %1 due to an expired certificate. The error was %2.

$Authentication failed for EAP method type %1 because the certificate chain was issued by an authority that is not trusted. The error was %2.

Deleting cached credentials as authentication failed for EAP method type %1.

pEAP session has been initialized to save user data.

Server Certificate Thumbprint: %1. Server Certificate Fully Qualified Domain Name: %2.

4VS_VERSION_INFO
cE
cE?StringFileInfo040904B0LCompanyNameMicrosoft Corporation\FileDescriptionRemote Access PPP EAP-TLSh$FileVersion10.0.17763.1 (WinBuild.160101.0800)6InternalNamerastls.dll.LegalCopyright Microsoft Corporation. All rights reserved.FOriginalFilenamerastls.dll.muij%ProductNameMicrosoft Windows Operating System>
ProductVersion10.0.17763.1DVarFileInfo$Translation	PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGX

Hacked By AnonymousFox1.0, Coded By AnonymousFox