Windows 10
- Many devices, such as processors or power supplies, require their own cooling devices. This association indicates where fans ...
- Many of the application compatibility strategies in Windows XP depend on "matching information", which will help to identify ...
- Many organizations use a registration authority (RA) to manage certificate requests. Use the following certificate to sign ...
- Many Windows 9x applications were not programmed to respond to task switches caused by pressing Alt-Tab, the Windows key, ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped View Alignment Incorrect} An attempt was made to map a view of a file, but either the specified base address or the ...
- March 2001 Application Compatibility Package is incompatible with this version of Windows. All of its features are currently ...
- Marker error for known Win32 errors that are currently being ignored by the compositor. This is to avoid returning S_OK when ...
- Marking an FT (fault tolerant) volume active will only mark underlying partitions active if they are primary partitions. ...
- Marking cluster starting at VCN 5 with LCN 6 for 7 clusters in attribute %4 of type code 2 and instance tag 3 as in use by ...
- Marking cluster starting at VCN 5 with LCN 6 for 7 clusters in attribute %4 of type code 2 and instance tag 3 as not in use ...
- Matched Effective policy for query name %1: Key Name %2: DnsSecValidationRequired %3, DnsQueryOverIPSec %4, DnsEncryption ...
- Matched effective policy for query name %1: Key Name %2: DnsSecValidationRequired %3, DnsQueryOverIPSec %4, DnsEncryption ...
- MaxBurstLength is not serially greater than FirstBurstLength. Dump data contains FirstBurstLength followed by MaxBurstLength. ...
- Maximum acceptable directory search response time (in milliseconds). This rule will issue a warning if the search response ...
- Maximum amount of time, in seconds, dirty lines or buckets may remain in the cache before they are flushed. A value of zero ...
- Maximum application log size This security setting specifies the maximum size of the application event log, which has a theoretical ...
- Maximum command sequence number is not serially greater than expected command sequence number in login response. Dump data ...
- Maximum depth below top level has been reached, forcing object to be serialized as strings. Object type at max depth: %1 ...
- Maximum depth limit reached when traversing tree, nodes below this level will not be traversed. Possible bug in provider ...
- Maximum length of a filename component supported by the Windows drive. A filename component is that portion of a filename ...
- Maximum lifetime for service ticket This security setting determines the maximum amount of time (in minutes) that a granted ...
- Maximum lifetime for user ticket renewal This security setting determines the period of time (in days) during which a user's ...
- Maximum lifetime for user ticket This security setting determines the maximum amount of time (in hours) that a user's ticket-granting ...
- Maximum number of directly addressable entities supported by this Controller. A value of 0 should be used if the number is ...
- Maximum number of incoming named pipe connections reached; new connections will be queued, and may time out or be rejected. ...
- Maximum number of kilobytes of memory that can be allocated to a process. For operating systems with no virtual memory, this ...
- Maximum number of minutes before the consumer will start a new instance. If zero, consumer lifetime is controlled by the ...
- Maximum number of process contexts the operating system can support. If there is no fixed maximum, the value should be 0. ...
- Maximum number of properties per document has been reached. The document is most likely corrupt, or it represents a denial ...
- Maximum number of scripts run before the consumer will start a new instance. The consumer should be shut down periodically ...
- Maximum password age This security setting determines the period of time (in days) that a password can be used before the ...
- Maximum PIN length configures the maximum number of characters allowed for the work PIN. The largest number you can configure ...
- Maximum received bits per second at each interval, logging latest 60 samples at each interval defined in IntervalSeconds ...
- Maximum run attempt limit for overall amoutn of machine boots reached. Lpremove won't run again. This is error situation ...
- Maximum security log size This security setting specifies the maximum size of the security event log, which has a theoretical ...
- Maximum Segment Descriptors Exceeded} The command specified a number of descriptors that exceeded the maximum supported by ...
- Maximum sent bits per second at each interval, logging latest 60 samples at each interval defined in IntervalSeconds (second). ...
- Maximum size to which file is allowed to grow. It will be archived when it exceeds this size. Archived files have an extension ...
- Maximum size, in Kbytes, of media supported by this device. KBytes is interpreted as the number of bytes multiplied by 1000 ...
- Maximum system log size This security setting specifies the maximum size of the system event log, which has a theoretical ...
- Maximum tolerance for computer clock synchronization This security setting determines the maximum time difference (in minutes) ...
- MaxNumberOfPasswords specifies the number of passwords definable in the modem itself. If this feature is not supported, enter ...
- MaxRechargeTime indicates the maximum time, in minutes, to fully charge the battery. This property represents the time to ...
- May be one or more of the following: 0x00000001 - Fill. Fill files when pinning. 0x00000020 - PinForUser. Pin for the logged-on ...
- May be one or more of the following: 0x00000001 - FillSparse. Fill sparse files. 0x00000002 - SyncIn. Sync server changes ...
- May be one or more of the following: 0x00000001 - If the new owner already has a profile, calling this method with this flag ...
- May be one or more of the following: 0x00000001 - Indicate the profile is a temporary profile, it will be deleted at user ...
- May be one or more of the following: 0x00000001 - Interactive. OK to interact with user if necessary (i.e. alternate credential ...
- May be one or more of the following: 0x00000001 - NoAutoCached. Do not delete non-pinned files. 0x00000002 - NoPinned. Do ...
- May be one or more of the following: 0x00000020 - UnpinForUser. Unpin for the logged-on user. 0x00000040 - UnpinForUser_Policy. ...
- May be one or more of the following: 0x00000200 - LowPriority. Perform operation at low CPU and I/O priority whenever possible. ...
- may need to restart the WinRM service if a configuration using this name has recently been unregistered, certain system data ...
- MD-PC Link for Mebius V1.01 has a known compatibility issue with this version of Windows. For an update that is compatible ...
- MD5 and DES are considered to be insecure algorithms and their use is not recommended. Are you sure that you want to use ...
- MDL Read Hits is the percentage of Memory Descriptor List (MDL) Read requests to the file system cache that hit the cache, ...
- MDL Reads/sec is the frequency of reads from the file system cache that use a Memory Descriptor List (MDL) to access the ...
- Mebius Online User Touroku 5.0 has a known compatibility issue with this version of Windows. For an update that is compatible ...
- Mechanisms, such as HTTP cookies, for maintaining an active connection with an individual or for automatically identifying ...
- MechWarrior 3 has a known compatibility issue with this version of Windows. For an update that is compatible with this version ...
- Media player and imaging program compatibility layers were successfully registered for device %1. Layer bits %2 were requested, ...
- Media sharing is currently disabled, either because the sharing service is not running or your firewall settings have changed. ...
- Media streaming allows you to send your music, pictures and videos to other computers and devices on your network. It also ...
- Media streaming is disabled by group policy defined by your administrator. Contact your administrator for policy details. ...
- Media usage rights have previously been backed up to this folder. Do you want to replace the older usage rights with the ...
- Medium alert level: Indicates an item that might affect your privacy or make changes to your PC. Recommended action: Review ...
- Member %1 of type %2 in file %3 uses IReference as a parameter. Reference strings are not supported as a method parameter.%0 ...
- Member %1 of type %2 in file %3 uses IReferenceArray as a parameter. Reference arrays are not supported as a method parameter.%0 ...