Windows 8

  1. You can set the ENUM_CESSETUPPROP_USE_IISAPPPOOLIDENTITY property to FALSE only by calling the SetApplicationPoolCredentials ...
  2. You can set the maximum number of monitors that the virtual machine supports and the maximum resolution for each monitor. ...
  3. You can set up either one or two tuners for use with Windows Media Center. With two tuners, you can watch TV on one channel ...
  4. You can set up your computer so that users do not have to type a user name and password to sign in. To do this, specify a ...
  5. You can setup the DHCP server to automatically update authoritative DNS servers with the host (A) and pointer (PTR) records ...
  6. You can setup the DHCP server to automatically update authoritative DNS servers with the host (AAAA) and pointer (PTR) records ...
  7. You can share files and printers with other computers. You can also stream media to devices. The homegroup is protected with ...
  8. You can share this printer with other users on your network. The printer will not be available when the computer is sleeping ...
  9. You can sign data by using a private key in a file (.pvk) or by using a private from a cryptographic service provider (CSP). ...
  10. You can specify a boot image to use when PXE booting this computer. Click Select. to select an image on the referral server ...
  11. You can specify a client unattend file to automate the Windows Deployment Services Setup client. Enter the path to the client ...
  12. You can specify an optional referral server from which this computer should download its boot program and PXE prompt policy ...
  13. You can specify devices and resources on the client device that can be accessed when a user connects to a session-based desktop. ...
  14. You can specify devices and resources on the client device that can be accessed when a user connects to a virtual desktop ...
  15. You can specify how to automatically approve installation of updates for selected groups and how to approve revisions to ...
  16. You can specify new or existing folders to store the virtual machine files. Otherwise, the wizard imports the files to default ...
  17. You can specify the default boot program and boot image to use when PXE booting this computer. Click Select. to browse the ...
  18. You can specify the ProxyList and ProxyBypassList parameters only when the ProxyUsage parameter is set to override. Verify ...
  19. You can specify which extensions to enable, in order to add or remove functionality in your console, snap-in, or extension. ...
  20. You can start the virtual machine now. You can manually reverse the replication direction later using the Reverse Replication ...
  21. You can still continue to set up TV without a B-CAS card. However, you will not be able to watch TV programs until a B-CAS ...
  22. You can still install Hyper-V Server, but the following Windows features aren't available or might not work in Hyper-V Server: ...
  23. You can sync the content from Windows Media Center to your portable device. If you have a portable device, make sure it is ...
  24. You can transfer files and settings in these user accounts from your old PC. To choose how you want the user accounts on ...
  25. You can transfer files and settings in these user accounts. To choose how you want the user accounts on your old PC to get ...
  26. You can try System Restore again and choose a different restore point. If you continue to see this error, you can try an ...
  27. You can use a Fax Server to share and manage network fax resources from a central location, which enables users to send and ...
  28. You can use a Fibre Channel adapter to access Fibre Channel based storage directly from the guest operating system. Integration ...
  29. You can use a recovery drive to help troubleshoot problems with your PC even if it can't start. If your PC came with a recovery ...
  30. You can use an identity integration product, such as Identity Management for UNIX (available in Windows Server 2003 R2 and ...
  31. You can use Bluetooth technology to transfer files wirelessly between this computer and a Bluetooth device, or between this ...
  32. You can use Device Manager to view a list of hardware devices installed on your computer and set properties for each device. ...
  33. You can use dynamic disks to create software-based RAID volumes that can be mirrored, or they can be striped or spanned across ...
  34. You can use dynamic disks to create software-based volumes that can be mirrored, or they can be striped or spanned across ...
  35. You can use either UNIX-style password and group files or Network Information Service (NIS) servers to create maps for UNIX-style ...
  36. You can use filename character mappings to replace characters which NFS supports but NTFS does not with characters NTFS does ...
  37. You can use filters to define which clients get this image for installation, based on the hardware of the installing client. ...
  38. You can use filters to define which clients install the driver packages in this group, based upon the hardware of the installing ...
  39. You can use Performance Monitor to view performance data either in real time or from a log file. Create Data Collector Sets ...
  40. You can use Task Scheduler to create and manage common tasks that your computer will carry out automatically at the times ...
  41. You can use the Active Directory Certificate Services Client software to host the certificate enrollment Web pages on a separate ...
  42. You can use the command-line tool Dfsradmin.exe to resolve this issue. For information about troubleshooting this error, ...
  43. You can use the Journal Note Writer print driver to capture an electronic image of your document that you can navigate, print, ...
  44. You can use the system repair disc to access system recovery options that can help you recover your computer from a serious ...
  45. You can use these network settings to control the static IP address that a virtual machine uses when started as part of a ...
  46. You can use these settings to define which client computers this server will respond to. Known clients are the clients that ...
  47. You can use this dialog box to modify the maximum number of items that are displayed, per container, in the Active Directory ...
  48. You can use this space to list the computer and group records that are in the WINS database. To list the records, click Action, ...
  49. You can use this touchscreen with Windows 8 but it won't be as responsive and gestures won't be as precise as a touchscreen ...
  50. You can use this wizard to configure backups to run on a regular schedule. To create a backup schedule, you should first ...
  51. You can use this wizard to configure NPS to record accounting information to a local text file, to a SQL Server database, ...
  52. You can use this wizard to configure Windows Deployment Services. Once the server is configured, you will need to add at ...
  53. You can use this wizard to create new authorization policies. A Remote Desktop connection authorization policy (RD CAP) allows ...
  54. You can use this wizard to recover files, applications, volumes, or the system state from a backup that was created earlier. ...
  55. You can use Windows Deployment Services to install and configure Microsoft Windows operating system remotely on computers ...
  56. You can use Windows Easy Transfer to transfer files and settings from a PC running Windows 8, Windows 7, Windows Vista, or ...
  57. You can use Windows System Resource Manager to allocate processor and memory resources to applications, users, Remote Desktop ...
  58. You can use your set-top box remote control to identify the codes that Windows Media Center uses to control your set-top ...
  59. You can use {0} tuners with Windows Media Center, enabling you to record {0} TV shows at the same time. Which TV tuners do ...
  60. You can view and manage IP addresses by their defined range. An IP address range is typically a DHCP scope or static IP address ...
  61. You can view simulated policy settings for a selected user (or a container with user information) and computer (or a container ...
  62. You can view this folder in File Explorer. To view this folder, click Allow when you see the Internet Explorer Security dialog ...
  63. You can't access your files, and files created in this profile will be deleted when you sign out. To fix this, sign out and ...
  64. You can't create a shortcut to another shortcut. Either copy the shortcut and place it in the new location, or create a new ...
  65. You can't create both a recovery password and a recovery key. A recovery password can't be created because it doesn't comply ...
  66. You can't directly upgrade from Windows XP to Windows 8. Go to http://go.microsoft.com/fwlink/?LinkID=142337 to learn how ...
  67. You can't do a typical upgrade using an installation disc that's different from the language installed on your computer. ...
  68. You can't remove %1 because this object is inheriting permissions from its parent. To remove %1, you must prevent this object ...
  69. You can't sign in to a domain account using a fingerprint on this PC. Sign in using other credentials, or contact your system ...
  70. You can't upgrade 64-bit Windows to a 32-bit version of Windows. To upgrade, obtain a 64-bit version of the installation ...
  71. You can't upgrade this prerelease version of Windows. Go to http://go.microsoft.com/fwlink/?LinkID=142337 to see how to install ...
  72. You cannot access, create, remove, or rename local connection authorization policies (CAPs) when CentralCAPEnabled is set ...
  73. You cannot add any more replicated folders to this wizard. If you need to add more replicated folders, complete this wizard, ...
  74. You cannot add more key exchange security methods. The maximum of %d key exchange security methods have already been added ...
  75. You cannot add the following criteria to the query since the default password policy in this domain specifies that user accounts' ...