(illegal location)  (user started up)  (registering presence)  (check routers)  (external program)  (missing transactions)  (log swapped)  (log stopped)  (log started)  (version)  (deleted, inactive)  (editted, inactive) (added, inactive)  (usage dump)  (deleted)  (editted)  (added)  (detail dump)  (user inactive)  (version old)  (version obsolete)  (authentication failed)  (user request)  (user changed queues)  (user notified)  (all keys still in use)  (user not authorized)  (keys do not match)  (guests unauthorized)  (remote access)  (remote zone)  (user has max. keys)  (no keys available)  (all keys in use)  (user authenticating)  (key timed out)  (key reclaimed)  (key expired)  (user shutdown)  (server shutdown)  (user off-line)  (bad key received)  (normal)  (portable key)  (rebuilt table)  (adjusted table)  (program launched)