Windows Server 2003
- When you display files in Details view, you can sort them by clicking column headings. To sort files in reverse order, click ...
- When you enable Internet Explorer Enhanced Security Configuration, it sets Internet Explorer security settings to limit how ...
- When you enable this setting, it will prevent Internet Information Services (IIS) from being installed, and you will not ...
- When you enter a new IP address or subnet mask for this cluster or host, you must also enter the new address in the Internet ...
- When you first start replication, the master replica's contents are copied to all of the other enabled targets in the replication ...
- When you get a new debit card or credit card from your bank, your bank typically asks you to 'activate' the card before you ...
- When you have successfully connected to the Internet, click OK. Or click Cancel to continue using the existing Setup files ...
- When you open the Briefcase again, drag the files out of the Briefcase, and then drag them in again to create a new sync ...
- When you post a message to a newsgroup or send an e-mail message, your display name will appear in the From field. Type your ...
- When you print a document, a printer icon appears on the taskbar. Double-click it to see a list of documents waiting to print. ...
- When you quit or refresh DFS, the topology you select is treated as Custom because your network uses an earlier version of ...
- When you read a help topic, you can mark it for later reference. Find can then search for information that is related to ...
- When you renew a Certification Authority, you may reuse the existing keys. Select "Yes" to reuse keys and "No" to generate ...
- When you restore Windows 2000 security settings for Internet Explorer, you also restore the lists of Trusted sites and Local ...
- When you send an e-mail message, it will be placed in your 'Outbox' folder ready to be sent the next time you choose the ...
- When you send e-mail, your name will appear in the From field of the outgoing message. Type your name as you would like it ...
- When you specify a Dynamic Link Library as a connect action, you must provide the function name that will be called as the ...
- When you start your computer, the Welcome screen will show you all the names you type on this screen in alphabetical order. ...
- When you use NetMeeting to call this computer from another computer, you will be asked to supply a user name and a password ...
- When you're connected to the Internet, Help and Support Center also searches the Microsoft Knowledge Base Web site for topics ...
- When your computer hibernates, it stores whatever it has in memory on your hard disk and then shuts down. When your computer ...
- When your custom package is installed, Internet Explorer will be placed in the folder you select below. Note that if Internet ...
- Whenever you audit start and stop events, Certificate Services must calculate a cryptographic hash of the database. Depending ...
- Where a storage extent must be accessed through a media access device, this relationship is described by the CIM_MediaPresent ...
- Whether you are working online or offline, you can access your Offline Files in the same network folders or in the Offline ...
- Whether you know exactly what you're looking for, or want to browse for what you need, the Index provides you with a fast, ...
- Whether you've never had an Internet account, or you had an account for another computer, let's set up this computer for ...
- Whether you've never had an Internet account, or you had an account for another computer, we'll help you set up this computer ...
- While copying group membership, the group object for the primary group ID was not found. Instead, the Domain Users group ...
- While forming a server cluster on this node, Cluster service failed to detect a viable network enabled for cluster use. Other ...
- While processing a change to the DNS Host Name for an object, the Service Principal Name values could not be kept in sync. ...
- While processing a TGS request for the target server %1, the account %2 did not have a suitable key for generating a Kerberos ...
- While processing a TGS request for the target server %1, the account %2 did not have a suitable key for generating a Kerberos ...
- While processing Active Directory event logging overrides, the number of overrides located exceeded the maximum override ...
- While processing an AS request for target service %1, the account %2 did not have a suitable key for generating a Kerberos ...
- While processing an AS request for target service %1, the account %2 did not have a suitable key for generating a Kerberos ...
- While processing security descriptor propagation, the directory service failed to write a new security descriptor for object. ...
- While replicating changes from a source domain controller, a request to delete the following critical system object was detected. ...
- While replicating the following schema object, a conflict was detected with the following existing attribute. Schema object: ...
- While replicating the following schema object, a conflict was detected with the following existing schema class. Schema object: ...
- While searching for an index, Active Directory detected that a new index is needed for the following attribute. Attribute: ...
- While the vast majority of HTTP servers use port 80, this is not a requirement. For example, HTTP Proxy servers often use ...
- While transmitting or receiving data, the server encountered a network error. Occassional errors are expected, but large ...
- While using your smartcard for the Credential Manager the Kerberos subsystem encountered an error that appears to be from ...
- While using your smartcard over a VPN connection, the Kerberos subsystem encountered an error. Typically, this indicates ...
- While validating that %2 was really a serial port, the baud rate register could not be set consistantly. The device is assumed ...
- While validating that %2 was really a serial port, the contents of the divisor latch register was identical to the interrupt ...
- While validating that %2 was really a serial port, the contents of the divisor latch register was identical to the interrupt ...
- While validating that %2 was really a serial port, the interrupt enable register contained enabled bits in a must be zero ...
- While validating that %2 was really a serial port, the interrupt id register contained enabled bits in a must be zero bitfield. ...
- While validating that %2 was really a serial port, the modem control register contained enabled bits in a must be zero bitfield. ...
- While you are activating Windows online, you can also provide some personal information to register your copy of Windows. ...
- While your computer was disconnected from the network, the following file was changed, both on your computer and on the network ...
- will no longer be able to log on, and all of %1's settings will be deleted. However, %1's files will be saved on your desktop ...
- Window Send Average is the running average number of data bytes that were sent before waiting for an acknowledgment from ...
- Window Send Maximum is the maximum number of bytes of data that will be sent before waiting for an acknowledgment from the ...
- Windows (R) File Checker Version 5.2 Microsoft Corporation. . Scans all protected system files and replaces incorrect versions ...
- Windows 2000 supports 4 levels of Encryption are: Low: Only data sent from client to server is protected by encryption based ...
- Windows 2000/XP contains an earlier version of Internet Explorer components. When upgrading to Windows 2000/XP, you will ...
- Windows 95 cannot confirm that this is your new password. This may be because you mistyped your password. Occasionally, changing ...
- Windows allows applications to store logon information for network locations and Web sites. To edit an existing entry, select ...
- Windows Audio is now enabled, but the changes will not take effect until you restart Windows. If you want to restart Windows ...
- Windows can automatically dial the initial connection to the Internet or other public network, before establishing the virtual ...
- Windows can compress files that you haven't accessed in a while. Compressing the files will save disk space while still enabling ...
- Windows can help you connect to a shared network folder and assign a drive letter to the connection so that you can access ...
- Windows can not edit the permissions on '%1' because they have been written in a nonstandard format by another application. ...
- Windows can resize the pictures you send in e-mail so that they transfer faster and are easier to view by the recipient. ...
- Windows can store your logon information for network locations and Web sites. To add an entry, click Add. To edit an existing ...
- Windows can work around the problem by turning off your processor's floating-point module and performing floating-point operations ...
- Windows cannot access common name (usually a GUID) for GPO %1. This is most likely caused by the cn property not being found ...
- Windows cannot access the file %1 for one of the following reasons: there is a problem with the network connection, the disk ...
- Windows cannot access the file gpt.ini for GPO %1. The file must be present at the location . (%3). Group Policy processing ...
- Windows cannot access the GPLink property for the object %1 in Active Directory. The access to the object may be denied. ...
- Windows cannot access the specified device, path, or file. You may not have the appropriate permissions to access the item. ...
- Windows cannot access the the object %1 in Active Directory. The access to the object may be denied. Group Policy processing ...