Windows 10

  1. Many devices, such as processors or power supplies, require their own cooling devices. This association indicates where fans ...
  2. Many of the application compatibility strategies in Windows XP depend on "matching information", which will help to identify ...
  3. Many organizations use a registration authority (RA) to manage certificate requests. Use the following certificate to sign ...
  4. Many Windows 9x applications were not programmed to respond to task switches caused by pressing Alt-Tab, the Windows key, ...
  5. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  6. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  7. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  8. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  9. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  10. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  11. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  12. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  13. Mapped View Alignment Incorrect} An attempt was made to map a view of a file, but either the specified base address or the ...
  14. March 2001 Application Compatibility Package is incompatible with this version of Windows. All of its features are currently ...
  15. Marker error for known Win32 errors that are currently being ignored by the compositor. This is to avoid returning S_OK when ...
  16. Marking an FT (fault tolerant) volume active will only mark underlying partitions active if they are primary partitions. ...
  17. Marking cluster starting at VCN 5 with LCN 6 for 7 clusters in attribute %4 of type code 2 and instance tag 3 as in use by ...
  18. Marking cluster starting at VCN 5 with LCN 6 for 7 clusters in attribute %4 of type code 2 and instance tag 3 as not in use ...
  19. Matched Effective policy for query name %1: Key Name %2: DnsSecValidationRequired %3, DnsQueryOverIPSec %4, DnsEncryption ...
  20. Matched effective policy for query name %1: Key Name %2: DnsSecValidationRequired %3, DnsQueryOverIPSec %4, DnsEncryption ...
  21. MaxBurstLength is not serially greater than FirstBurstLength. Dump data contains FirstBurstLength followed by MaxBurstLength. ...
  22. Maximum acceptable directory search response time (in milliseconds). This rule will issue a warning if the search response ...
  23. Maximum amount of time, in seconds, dirty lines or buckets may remain in the cache before they are flushed. A value of zero ...
  24. Maximum application log size This security setting specifies the maximum size of the application event log, which has a theoretical ...
  25. Maximum command sequence number is not serially greater than expected command sequence number in login response. Dump data ...
  26. Maximum depth below top level has been reached, forcing object to be serialized as strings. Object type at max depth: %1 ...
  27. Maximum depth limit reached when traversing tree, nodes below this level will not be traversed. Possible bug in provider ...
  28. Maximum length of a filename component supported by the Windows drive. A filename component is that portion of a filename ...
  29. Maximum lifetime for service ticket This security setting determines the maximum amount of time (in minutes) that a granted ...
  30. Maximum lifetime for user ticket renewal This security setting determines the period of time (in days) during which a user's ...
  31. Maximum lifetime for user ticket This security setting determines the maximum amount of time (in hours) that a user's ticket-granting ...
  32. Maximum number of directly addressable entities supported by this Controller. A value of 0 should be used if the number is ...
  33. Maximum number of incoming named pipe connections reached; new connections will be queued, and may time out or be rejected. ...
  34. Maximum number of kilobytes of memory that can be allocated to a process. For operating systems with no virtual memory, this ...
  35. Maximum number of minutes before the consumer will start a new instance. If zero, consumer lifetime is controlled by the ...
  36. Maximum number of process contexts the operating system can support. If there is no fixed maximum, the value should be 0. ...
  37. Maximum number of properties per document has been reached. The document is most likely corrupt, or it represents a denial ...
  38. Maximum number of scripts run before the consumer will start a new instance. The consumer should be shut down periodically ...
  39. Maximum password age This security setting determines the period of time (in days) that a password can be used before the ...
  40. Maximum PIN length configures the maximum number of characters allowed for the work PIN. The largest number you can configure ...
  41. Maximum received bits per second at each interval, logging latest 60 samples at each interval defined in IntervalSeconds ...
  42. Maximum run attempt limit for overall amoutn of machine boots reached. Lpremove won't run again. This is error situation ...
  43. Maximum security log size This security setting specifies the maximum size of the security event log, which has a theoretical ...
  44. Maximum Segment Descriptors Exceeded} The command specified a number of descriptors that exceeded the maximum supported by ...
  45. Maximum sent bits per second at each interval, logging latest 60 samples at each interval defined in IntervalSeconds (second). ...
  46. Maximum size to which file is allowed to grow. It will be archived when it exceeds this size. Archived files have an extension ...
  47. Maximum size, in Kbytes, of media supported by this device. KBytes is interpreted as the number of bytes multiplied by 1000 ...
  48. Maximum system log size This security setting specifies the maximum size of the system event log, which has a theoretical ...
  49. Maximum tolerance for computer clock synchronization This security setting determines the maximum time difference (in minutes) ...
  50. MaxNumberOfPasswords specifies the number of passwords definable in the modem itself. If this feature is not supported, enter ...
  51. MaxRechargeTime indicates the maximum time, in minutes, to fully charge the battery. This property represents the time to ...
  52. May be one or more of the following: 0x00000001 - Fill. Fill files when pinning. 0x00000020 - PinForUser. Pin for the logged-on ...
  53. May be one or more of the following: 0x00000001 - FillSparse. Fill sparse files. 0x00000002 - SyncIn. Sync server changes ...
  54. May be one or more of the following: 0x00000001 - If the new owner already has a profile, calling this method with this flag ...
  55. May be one or more of the following: 0x00000001 - Indicate the profile is a temporary profile, it will be deleted at user ...
  56. May be one or more of the following: 0x00000001 - Interactive. OK to interact with user if necessary (i.e. alternate credential ...
  57. May be one or more of the following: 0x00000001 - NoAutoCached. Do not delete non-pinned files. 0x00000002 - NoPinned. Do ...
  58. May be one or more of the following: 0x00000020 - UnpinForUser. Unpin for the logged-on user. 0x00000040 - UnpinForUser_Policy. ...
  59. May be one or more of the following: 0x00000200 - LowPriority. Perform operation at low CPU and I/O priority whenever possible. ...
  60. may need to restart the WinRM service if a configuration using this name has recently been unregistered, certain system data ...
  61. MD-PC Link for Mebius V1.01 has a known compatibility issue with this version of Windows. For an update that is compatible ...
  62. MD5 and DES are considered to be insecure algorithms and their use is not recommended. Are you sure that you want to use ...
  63. MDL Read Hits is the percentage of Memory Descriptor List (MDL) Read requests to the file system cache that hit the cache, ...
  64. MDL Reads/sec is the frequency of reads from the file system cache that use a Memory Descriptor List (MDL) to access the ...
  65. Mebius Online User Touroku 5.0 has a known compatibility issue with this version of Windows. For an update that is compatible ...
  66. Mechanisms, such as HTTP cookies, for maintaining an active connection with an individual or for automatically identifying ...
  67. MechWarrior 3 has a known compatibility issue with this version of Windows. For an update that is compatible with this version ...
  68. Media player and imaging program compatibility layers were successfully registered for device %1. Layer bits %2 were requested, ...
  69. Media sharing is currently disabled, either because the sharing service is not running or your firewall settings have changed. ...
  70. Media streaming allows you to send your music, pictures and videos to other computers and devices on your network. It also ...
  71. Media streaming is disabled by group policy defined by your administrator. Contact your administrator for policy details. ...
  72. Media usage rights have previously been backed up to this folder. Do you want to replace the older usage rights with the ...
  73. Medium alert level: Indicates an item that might affect your privacy or make changes to your PC. Recommended action: Review ...
  74. Member %1 of type %2 in file %3 uses IReference as a parameter. Reference strings are not supported as a method parameter.%0 ...
  75. Member %1 of type %2 in file %3 uses IReferenceArray as a parameter. Reference arrays are not supported as a method parameter.%0 ...