Windows 8

  1. With a homegroup, you can share files and printers with other computers on your home network. You can also stream media to ...
  2. With BranchCache, clients can be configured to use a hosted cache. This firewall rule opens up the needed ports on the hosted ...
  3. With BranchCache, clients can be configured to use the hosted cache. This firewall rule opens up the needed ports on the ...
  4. With BranchCache, clients use HTTP to retrieve content from each other in the distributed mode, and from the hosted cache ...
  5. With BranchCache, clients use the WS Discovery protocol to lookup content availability on the local subnet. This firewall ...
  6. With Server for NFS, a Windows-based computer can act as a Network File System (NFS) server. Server for NFS enables a Windows-based ...
  7. With Software Restriction Policies, you can define a default security level and rules (exceptions to that default security ...
  8. With the '-d' apply_to switch, the basic format is: MPIODiskNumber LBPolicy Depending on the policy chosen, there may be ...
  9. With the appropriate group policy settings in place you can connect directly using either the computer name or the IP address. ...
  10. With this edition of Windows, settings for sharing libraries and devices with other computers in the homegroup are not available. ...
  11. With this option enabled, clients can only access application servers in the specified security groups. Clients can still ...
  12. With this option selected, DirectAccess client computers located on the Internet can connect to the internal network via ...
  13. With this setting enabled, all mobile computers in the specified security groups will be enabled as DirectAccess clients. ...
  14. With this setting enabled, end-to-end traffic is authenticated but not encrypted. This option is less secure. Authentication ...
  15. With User Name Mapping, you can create advanced group maps, which associate dissimilarly named Windows and UNIX groups. Advanced ...
  16. With User Name Mapping, you can create advanced user maps, which associate all dissimilarly named Windows and UNIX users. ...
  17. With User Name Mapping, you can create simple identity maps which automatically associate all identically named Windows and ...
  18. With Windows Media Center, you can watch and record TV on your computer. If both a standard TV signal and a digital TV antenna ...
  19. With Windows Server Backup you can schedule backups to run once a day or more often, and you can choose to back up the entire ...
  20. With your current power plan, your computer hibernates after %s hours of sleep. While it's hibernating, Windows can't update ...
  21. Without an inbound exception for the Key Management Service (TCP), the Volume Activation Tools will not be able to query ...
  22. Without an inbound exception for the Remote Management (RPC), the Volume Activation Tools will not be able to query or configure ...
  23. Without an inbound exception for the Windows Management Instrumentation (WMI), the Volume Activation Tools will not be able ...
  24. Without these updates, Hyper-V Server might not install properly and your computer might be more vulnerable to security threats. ...
  25. WLAN AutoConfig service failed to connect to a wireless network. Network Adapter: %2 Interface GUID: %1 Connection Mode: ...
  26. WLAN AutoConfig service has failed to start the hosted network. Error Code: %2 Error Message: %3 Interface GUID: %1 SSID: ...
  27. WLAN AutoConfig service has failed to stop the hosted network. Error Code: %2 Error Message: %3 Interface GUID: %1 SSID: ...
  28. WLAN AutoConfig service has successfully connected to a wireless network. Network Adapter: %2 Interface GUID: %1 Connection ...
  29. WLAN AutoConfig service has successfully disconnected from a wireless network. Network Adapter: %2 Interface GUID: %1 Connection ...
  30. WLAN AutoConfig service started a connection to a wireless network. Network Adapter: %2 Interface GUID: %1 Connection Mode: ...
  31. WLAN Security Settings: BSS Type %1, Authentication %2, Encryption %3, OneX Enabled %4, Eap Information - Type %5, Vendor ...
  32. WLBS_PORT_OVERLAP At least one of the port numbers in the specified port rule is currently listed in at least one other port ...
  33. WLRoaming) A missing blob for setting unit %1 in collection %2 was detected in cloud storage, but this client cannot repair ...
  34. WLRoaming) No payload 1 settings were downloaded because the settings folder was not present in cloud storage. This is expected ...
  35. WLRoaming) Shared settings in the collection "%1" didn't sync. The updates were blocked by the server because they're too ...
  36. WLRoaming) Successfully applied %2 setting unit(s) and failed to apply %3 setting unit(s) to cloud storage for collection ...
  37. WLRoaming) Successfully resolved a high priority write conflict against the cloud with setting unit %1 for collection %2 ...
  38. WLRoaming) Successfully resolved a high priority write conflict against the local cache with setting unit %1 for collection ...
  39. WLRoaming) The LiveProviderSession has timed out waiting for an unlock event on a non-AoAc device. This should be a rare ...
  40. WMI allows script-based management of numerous operating system components including disk drives, event logs, network adapter ...
  41. WMI filters can be linked to Group Policy objects (GPO). If a filter is linked to a GPO, then that GPO applies only to those ...
  42. WMI filters can be linked to Group Policy objects (GPO). If a filter is linked to a GPO, then that GPO applies only to those ...
  43. WMI interop namespace class "%1" has been overwritten. Some of the Interop scenarios might not work properly. Please issue ...
  44. WMI is used to apply DirectAccess settings on mobile computers in the specified security groups. You do not have sufficient ...
  45. WNP Keep Alive Detector resetting Idle Failed Interval. Last Idle-Succeeded interval %1 seconds is larger than Idle-Failed ...
  46. WNP Transport Layer received command for the %6 with Verb: %1, Trid: %2, Namespace: %3 containing %4 bytes of payload: %5. ...
  47. WNP Transport Layer received command when disconnected for the %6 with Verb: %1, Trid: %2, Namespace: %3 containing %4 bytes ...
  48. WordPad does not support all of the features of this document's format. Some content might be missing or displayed improperly. ...
  49. WordPad was unable to open the URL. Check the URL and try again. If you continue to see this problem, you might not have ...
  50. Work offline anyway All applicable open files will be forced closed and the folder will work offline. This might result in ...
  51. Work offline anyway All applicable open files will be forced closed and the folder will work offline. This might result in ...
  52. Workflow definition has been recycled. Workflow definition cache limit is {0}. Retry after importing the workflow or module ...
  53. Working Set - Private displays the size of the working set, in bytes, that is use for this process only and not shared nor ...
  54. Working Set - Shared displays the size of the working set, in bytes, that is sharable and may be used by other processes. ...
  55. Working Set is the current size, in bytes, of the Working Set of this process. The Working Set is the set of memory pages ...
  56. Working Set Peak is the maximum size, in bytes, of the Working Set of this process at any point in time. The Working Set ...
  57. Working Set Range Error} An attempt was made to set the working set minimum or maximum to values which are outside of the ...
  58. would parse each line in myfile.txt, ignoring lines that begin with a semicolon, passing the 2nd and 3rd token from each ...
  59. Would you also like to remove Address bar search functionality installed by other programs? If your Internet Explorer Address ...
  60. Would you like to create a single partition that stores DNS zone data and replicates that data to all DNS servers that are ...
  61. Would you like to create a single partition that stores DNS zone data and replicates that data to all DNS servers that are ...
  62. Would you like to remove the server {0} permanently from your console? If not, the server will be temporarily removed and ...
  63. Wow64 Support includes all of WoW64 to support running 32-bit applications on Server Core installations. This feature is ...
  64. wpeutil options is required, and options are specific to each command. Commands: CreatePageFile /path= /size= Creates a page ...
  65. Write Bytes Cache/sec is the rate at which applications on your computer are writing to the file system cache by using the ...
  66. Write Bytes Network/sec is the rate at which applications are writing data across the network. This occurs when the file ...
  67. Write Bytes Non-Paging/sec is the rate at which bytes are written by the Redirector in response to normal file outputs by ...
  68. Write Bytes Paging/sec is the rate at which the Redirector is attempting to write bytes changed in the pages being used by ...
  69. Write Bytes/sec is the rate the server is writing data to files for the clients on this CPU. This value is a measure of how ...
  70. Write chunk container (%5 - %6.%7.ccc) header at offset %8 (Header: USN %9, VDL %10, #Chunk %11, NextLocalId %12, Flags %13, ...
  71. Write Copies/sec is the rate at which page faults are caused by attempts to write that have been satisfied by coping of the ...
  72. Write down the location where you saved your transfer file and make the file available on your new PC to continue the process. ...
  73. Write down the location where you saved your transfer file because you'll need to open it on your new PC. If you're upgrading ...
  74. Write down the location where you saved your transfer file because you'll need to open it on your new PC. If you're upgrading ...
  75. Write Operations Random/sec is the rate at which, on a file-by-file basis, writes are made that are not sequential. If a ...