Windows 8.1

  1. Wireless network association succeeded. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS ...
  2. Wireless network is blocked due to connection failure. Network Adapter: %1 Interface GUID: %2 Connection Mode: %5 Profile ...
  3. Wireless Network Policy Administration. Manage WLAN AutoConfig settings and IEEE 802.1X Security Settings for IEEE 802.11 ...
  4. Wireless security failed. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Peer ...
  5. Wireless security started. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Authentication: ...
  6. Wireless security started. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Authentication: ...
  7. Wireless security stopped. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Security ...
  8. With a homegroup you can share libraries and devices with other people on this network. You can also stream media to devices ...
  9. With a homegroup, you can share files and printers with other computers on your home network. You can also stream media to ...
  10. With a local account, you won't sign in to Windows with your e-mail address. You will not be able to use advanced capabilities ...
  11. With Anywhere Access, network users can securely share and access files, run applications, and back up their devices from ...
  12. With BranchCache, clients can be configured to use a hosted cache. This firewall rule opens up the needed ports on the hosted ...
  13. With BranchCache, clients can be configured to use the hosted cache. This firewall rule opens up the needed ports on the ...
  14. With BranchCache, clients use HTTP to retrieve content from each other in the distributed mode, and from the hosted cache ...
  15. With BranchCache, clients use the WS Discovery protocol to lookup content availability on the local subnet. This firewall ...
  16. With IP address "{0}" ICT may not be able to connect to domain controller virtual machine. Please exit this wizard and re ...
  17. With Server for NFS, a Windows-based computer can act as a Network File System (NFS) server. Server for NFS enables a Windows-based ...
  18. With Software Restriction Policies, you can define a default security level and rules (exceptions to that default security ...
  19. With the '-d' apply_to switch, the basic format is: MPIODiskNumber LBPolicy Depending on the policy chosen, there may be ...
  20. With the appropriate group policy settings in place you can connect directly using either the computer name or the IP address. ...
  21. With this edition of Windows, settings for sharing libraries and devices with other computers in the homegroup are not available. ...
  22. With this option enabled, clients can only access application servers in the specified security groups. Clients can still ...
  23. With this option selected, DirectAccess client computers located on the Internet can connect to the internal network via ...
  24. With this setting enabled, all mobile computers in the specified security groups will be enabled as DirectAccess clients. ...
  25. With this setting enabled, end-to-end traffic is authenticated but not encrypted. This option is less secure. Authentication ...
  26. With User Name Mapping, you can create advanced group maps, which associate dissimilarly named Windows and UNIX groups. Advanced ...
  27. With User Name Mapping, you can create advanced user maps, which associate all dissimilarly named Windows and UNIX users. ...
  28. With User Name Mapping, you can create simple identity maps which automatically associate all identically named Windows and ...
  29. With Windows Media Center, you can watch and record TV on your computer. If both a standard TV signal and a digital TV antenna ...
  30. With Windows Server Backup you can schedule backups to run once a day or more often, and you can choose to back up the entire ...
  31. Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
  32. Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
  33. Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
  34. Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
  35. Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
  36. Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
  37. Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
  38. Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
  39. Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. To ...
  40. Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. To ...
  41. Without an inbound exception for the Key Management Service (TCP), the Volume Activation Tools will not be able to query ...
  42. Without an inbound exception for the Remote Management (RPC), the Volume Activation Tools will not be able to query or configure ...
  43. Without an inbound exception for the Windows Management Instrumentation (WMI), the Volume Activation Tools will not be able ...
  44. Without these updates, Hyper-V Server might not install properly and your computer might be more vulnerable to security threats. ...
  45. Without these updates, Storage Server might not install properly and your computer might be more vulnerable to security threats. ...
  46. Without these updates, Windows might not install properly and your computer might be more vulnerable to security threats. ...
  47. Witness deregistration has completed. Status: %1 Cluster share name: %4 Cluster share type: %2 Guidance: The client successfully ...
  48. Witness registration has completed. Status: %1 Cluster share name: %4 Cluster share type: %2 File server cluster address: ...
  49. Witness Service is requesting to move an SMB client (%1) that is optimized to connect to a specific SMB server for one or ...
  50. WLAN AutoConfig service failed to connect to a wireless network. Network Adapter: %2 Interface GUID: %1 Connection Mode: ...
  51. WLAN AutoConfig service has failed to start the hosted network. Error Code: %2 Error Message: %3 Interface GUID: %1 SSID: ...
  52. WLAN AutoConfig service has failed to stop the hosted network. Error Code: %2 Error Message: %3 Interface GUID: %1 SSID: ...
  53. WLAN AutoConfig service has successfully connected to a wireless network. Network Adapter: %2 Interface GUID: %1 Connection ...
  54. WLAN AutoConfig service has successfully disconnected from a wireless network. Network Adapter: %2 Interface GUID: %1 Connection ...
  55. WLAN AutoConfig service started a connection to a wireless network. Network Adapter: %2 Interface GUID: %1 Connection Mode: ...
  56. WLAN Security Settings: BSS Type %1, Authentication %2, Encryption %3, OneX Enabled %4, Eap Information - Type %5, Vendor ...
  57. WLBS_PORT_OVERLAP At least one of the port numbers in the specified port rule is currently listed in at least one other port ...
  58. WMI allows script-based management of numerous operating system components including disk drives, event logs, network adapter ...
  59. WMI caches provider registration objects to decrease overallexecution time. The substem will drop cache entries either through ...
  60. WMI filters can be linked to Group Policy objects (GPO). If a filter is linked to a GPO, then that GPO applies only to those ...
  61. WMI filters can be linked to Group Policy objects (GPO). If a filter is linked to a GPO, then that GPO applies only to those ...
  62. WMI interop namespace class "%1" has been overwritten. Some of the Interop scenarios might not work properly. Please issue ...
  63. WMI is used to apply DirectAccess settings on mobile computers in the specified security groups. You do not have sufficient ...
  64. WNP Keep Alive Detector resetting Idle Failed Interval. Last Idle-Succeeded interval %1 seconds is larger than Idle-Failed ...
  65. WNP Transport Layer received command for the %6 with Verb: %1, Trid: %2, Namespace: %3 containing %4 bytes of payload: %5. ...
  66. WNP Transport Layer received command when disconnected for the %6 with Verb: %1, Trid: %2, Namespace: %3 containing %4 bytes ...
  67. Word cannot save this document because the required encoding file, ieencode.dll, is missing. Please run Setup again, and ...
  68. WordPad does not support all of the features of this document's format. Some content might be missing or displayed improperly. ...
  69. WordPad was unable to open the URL. Check the URL and try again. If you continue to see this problem, you might not have ...
  70. Work Folders couldn't detect changed files using the USN change journal, so it's scanning all files for changes. No action ...
  71. Work Folders detected a conflict on an item and decided a conflict resolution. Concurrency conflict: %1; Source item name: ...
  72. Work Folders detected that an error occured that requires the database to be recreated. Database path: %1; Error code: %2 ...
  73. Work Folders is syncing your files in the background. Any files that you store in Work Folders will be uploaded to your organization. ...
  74. Work Folders provides a way to use work files from a variety of computers, including work and personal devices. You can use ...
  75. Work Folders sync stopped because the Enterprise ID for this PC was remotely revoked by the issuing authority. Access to ...