Windows Server 2003

  1. When you display files in Details view, you can sort them by clicking column headings. To sort files in reverse order, click ...
  2. When you enable Internet Explorer Enhanced Security Configuration, it sets Internet Explorer security settings to limit how ...
  3. When you enable this setting, it will prevent Internet Information Services (IIS) from being installed, and you will not ...
  4. When you enter a new IP address or subnet mask for this cluster or host, you must also enter the new address in the Internet ...
  5. When you first start replication, the master replica's contents are copied to all of the other enabled targets in the replication ...
  6. When you get a new debit card or credit card from your bank, your bank typically asks you to 'activate' the card before you ...
  7. When you have successfully connected to the Internet, click OK. Or click Cancel to continue using the existing Setup files ...
  8. When you open the Briefcase again, drag the files out of the Briefcase, and then drag them in again to create a new sync ...
  9. When you post a message to a newsgroup or send an e-mail message, your display name will appear in the From field. Type your ...
  10. When you print a document, a printer icon appears on the taskbar. Double-click it to see a list of documents waiting to print. ...
  11. When you quit or refresh DFS, the topology you select is treated as Custom because your network uses an earlier version of ...
  12. When you read a help topic, you can mark it for later reference. Find can then search for information that is related to ...
  13. When you renew a Certification Authority, you may reuse the existing keys. Select "Yes" to reuse keys and "No" to generate ...
  14. When you restore Windows 2000 security settings for Internet Explorer, you also restore the lists of Trusted sites and Local ...
  15. When you send an e-mail message, it will be placed in your 'Outbox' folder ready to be sent the next time you choose the ...
  16. When you send e-mail, your name will appear in the From field of the outgoing message. Type your name as you would like it ...
  17. When you specify a Dynamic Link Library as a connect action, you must provide the function name that will be called as the ...
  18. When you start your computer, the Welcome screen will show you all the names you type on this screen in alphabetical order. ...
  19. When you use NetMeeting to call this computer from another computer, you will be asked to supply a user name and a password ...
  20. When you're connected to the Internet, Help and Support Center also searches the Microsoft Knowledge Base Web site for topics ...
  21. When your computer hibernates, it stores whatever it has in memory on your hard disk and then shuts down. When your computer ...
  22. When your custom package is installed, Internet Explorer will be placed in the folder you select below. Note that if Internet ...
  23. Whenever you audit start and stop events, Certificate Services must calculate a cryptographic hash of the database. Depending ...
  24. Where a storage extent must be accessed through a media access device, this relationship is described by the CIM_MediaPresent ...
  25. Whether you are working online or offline, you can access your Offline Files in the same network folders or in the Offline ...
  26. Whether you know exactly what you're looking for, or want to browse for what you need, the Index provides you with a fast, ...
  27. Whether you've never had an Internet account, or you had an account for another computer, let's set up this computer for ...
  28. Whether you've never had an Internet account, or you had an account for another computer, we'll help you set up this computer ...
  29. While copying group membership, the group object for the primary group ID was not found. Instead, the Domain Users group ...
  30. While forming a server cluster on this node, Cluster service failed to detect a viable network enabled for cluster use. Other ...
  31. While processing a change to the DNS Host Name for an object, the Service Principal Name values could not be kept in sync. ...
  32. While processing a TGS request for the target server %1, the account %2 did not have a suitable key for generating a Kerberos ...
  33. While processing a TGS request for the target server %1, the account %2 did not have a suitable key for generating a Kerberos ...
  34. While processing Active Directory event logging overrides, the number of overrides located exceeded the maximum override ...
  35. While processing an AS request for target service %1, the account %2 did not have a suitable key for generating a Kerberos ...
  36. While processing an AS request for target service %1, the account %2 did not have a suitable key for generating a Kerberos ...
  37. While processing security descriptor propagation, the directory service failed to write a new security descriptor for object. ...
  38. While replicating changes from a source domain controller, a request to delete the following critical system object was detected. ...
  39. While replicating the following schema object, a conflict was detected with the following existing attribute. Schema object: ...
  40. While replicating the following schema object, a conflict was detected with the following existing schema class. Schema object: ...
  41. While searching for an index, Active Directory detected that a new index is needed for the following attribute. Attribute: ...
  42. While the vast majority of HTTP servers use port 80, this is not a requirement. For example, HTTP Proxy servers often use ...
  43. While transmitting or receiving data, the server encountered a network error. Occassional errors are expected, but large ...
  44. While using your smartcard for the Credential Manager the Kerberos subsystem encountered an error that appears to be from ...
  45. While using your smartcard over a VPN connection, the Kerberos subsystem encountered an error. Typically, this indicates ...
  46. While validating that %2 was really a serial port, the baud rate register could not be set consistantly. The device is assumed ...
  47. While validating that %2 was really a serial port, the contents of the divisor latch register was identical to the interrupt ...
  48. While validating that %2 was really a serial port, the contents of the divisor latch register was identical to the interrupt ...
  49. While validating that %2 was really a serial port, the interrupt enable register contained enabled bits in a must be zero ...
  50. While validating that %2 was really a serial port, the interrupt id register contained enabled bits in a must be zero bitfield. ...
  51. While validating that %2 was really a serial port, the modem control register contained enabled bits in a must be zero bitfield. ...
  52. While you are activating Windows online, you can also provide some personal information to register your copy of Windows. ...
  53. While your computer was disconnected from the network, the following file was changed, both on your computer and on the network ...
  54. will no longer be able to log on, and all of %1's settings will be deleted. However, %1's files will be saved on your desktop ...
  55. Window Send Average is the running average number of data bytes that were sent before waiting for an acknowledgment from ...
  56. Window Send Maximum is the maximum number of bytes of data that will be sent before waiting for an acknowledgment from the ...
  57. Windows (R) File Checker Version 5.2 Microsoft Corporation. . Scans all protected system files and replaces incorrect versions ...
  58. Windows 2000 supports 4 levels of Encryption are: Low: Only data sent from client to server is protected by encryption based ...
  59. Windows 2000/XP contains an earlier version of Internet Explorer components. When upgrading to Windows 2000/XP, you will ...
  60. Windows 95 cannot confirm that this is your new password. This may be because you mistyped your password. Occasionally, changing ...
  61. Windows allows applications to store logon information for network locations and Web sites. To edit an existing entry, select ...
  62. Windows Audio is now enabled, but the changes will not take effect until you restart Windows. If you want to restart Windows ...
  63. Windows can automatically dial the initial connection to the Internet or other public network, before establishing the virtual ...
  64. Windows can compress files that you haven't accessed in a while. Compressing the files will save disk space while still enabling ...
  65. Windows can help you connect to a shared network folder and assign a drive letter to the connection so that you can access ...
  66. Windows can not edit the permissions on '%1' because they have been written in a nonstandard format by another application. ...
  67. Windows can resize the pictures you send in e-mail so that they transfer faster and are easier to view by the recipient. ...
  68. Windows can store your logon information for network locations and Web sites. To add an entry, click Add. To edit an existing ...
  69. Windows can work around the problem by turning off your processor's floating-point module and performing floating-point operations ...
  70. Windows cannot access common name (usually a GUID) for GPO %1. This is most likely caused by the cn property not being found ...
  71. Windows cannot access the file %1 for one of the following reasons: there is a problem with the network connection, the disk ...
  72. Windows cannot access the file gpt.ini for GPO %1. The file must be present at the location . (%3). Group Policy processing ...
  73. Windows cannot access the GPLink property for the object %1 in Active Directory. The access to the object may be denied. ...
  74. Windows cannot access the specified device, path, or file. You may not have the appropriate permissions to access the item. ...
  75. Windows cannot access the the object %1 in Active Directory. The access to the object may be denied. Group Policy processing ...