Windows 7

  1. HTTP streaming cannot be enabled because Internet Information Services (IIS) is using port 80 for HTTP connections. For more ...
  2. HTTP.SYS provided inconsistent site performance counter data to the World Wide Web Publishing Service (WWW Service), so the ...
  3. HY000The stored procedure required to complete this operation could not be found on the server (they were supplied with the ...
  4. Hyper-V allows you to virtualize your server workloads by running those workloads on virtual machines. You can use virtual ...
  5. Hyper-V Data Exchange connected to virtual machine '%1', but the version does not match the version expected by Hyper-V (Virtual ...
  6. Hyper-V Data Exchange failed to connect to virtual machine '%1' because the version does not match the version expected by ...
  7. Hyper-V Guest Shutdown connected to virtual machine '%1', but the version does not match the version expected by Hyper-V ...
  8. Hyper-V Guest Shutdown failed to connect to virtual machine '%1' because the version does not match the version expected ...
  9. Hyper-V Heartbeat connected to virtual machine '%1', but the version does not match the version expected by Hyper-V (Virtual ...
  10. Hyper-V Heartbeat failed to connect to virtual machine '%1' because the version does not match the version expected by Hyper-V ...
  11. Hyper-V is installed, but additional steps are required to begin running server workloads on virtual machines. Go to Hyper-V ...
  12. Hyper-V launch failed; at least one of the processors in the system does not appear to provide a virtualization platform ...
  13. Hyper-V launch failed; at least one of the processors in the system does not appear to support the features required by the ...
  14. Hyper-V launch failed; at least one of the processors in the system is incompatible with the others (MSR index %1, allowed ...
  15. Hyper-V launch failed; CPU %1 does not support the minimum features required to run Hyper-V (MSR index %2, allowed bits %3, ...
  16. Hyper-V launch failed; Leaf %3, register %4 feature mismatch: processor %1 has features %5; processor %2 has features %6. ...
  17. Hyper-V launch failed; Processor %1 does not provide the features necessary to run Hyper-V (BalStatus %2, leaf1 EAX %3, VMCR ...
  18. Hyper-V launch failed; Processor %1 does not provide the features necessary to run Hyper-V (leaf %2, register %3: features ...
  19. Hyper-V launch failed; the hypervisor boot loader does not support the vendor of at least one of the processors in the system. ...
  20. Hyper-V launch failed; the hypervisor image at %1%2 does not contain the hypervisor image description datastructures, and ...
  21. Hyper-V launch failed; the hypervisor image at %1%2 is revision %3, but the currently installed virtualization software only ...
  22. Hyper-V management tools were not found on the system. Creation and management of Virtual Machines will be disabled in Failover ...
  23. Hyper-V provides the services that you can use to create and manage virtual machines and their resources. Each virtual machine ...
  24. Hyper-V Time Synchronization connected to virtual machine '%1', but the version does not match the version expected by Hyper-V ...
  25. Hyper-V Time Synchronization failed to connect to virtual machine '%1' because the version does not match the version expected ...
  26. Hyper-V Volume Shadow Copy Requestor connected to virtual machine '%1', but the version does not match the version expected ...
  27. Hyper-V Volume Shadow Copy Requestor failed to connect to virtual machine '%1' because the version does not match the version ...
  28. Hyper-V VSS writer cannot identify the virtual machine with ID '%1'. Please check if there are any corrupt or invalid configuration ...
  29. I agree that I will manually remove the RDS CALs from the source license server. I understand that if I continue to use the ...
  30. I agree to discontinue using the source license server as a license server with the same RDS CALs that I am migrating. I ...
  31. I have an antivirus program that I'll monitor myself Choose this option if your antivirus program cannot report status to ...
  32. I need help with my computer. Would you please use Windows Remote Assistance to connect to my computer so you can help me? ...
  33. I understand that music copied from CDs is protected by law, including US and International copyright laws, and that I am ...
  34. I understand that music ripped from CDs is protected by law, including US and International copyright laws, and that I am ...
  35. I want to restore my Internet security settings myself This option will highlight which Internet settings are not at their ...
  36. I'll turn on %1 myself The publisher has not provided Windows a way to turn on and update the program. Choosing this option ...
  37. I'll turn on and update %1 myself The publisher has not provided Windows a way to turn on and update the program. Choosing ...
  38. I/O was attempted on a section object that has been floated as a result of a transaction ending. There is no valid data. ...
  39. I64i! bytes could not be recovered because of bad clusters on the backup image. You can retry the recovery operation using ...
  40. I64i! bytes could not be written to the recovered volume because of bad clusters on the volume (%2). Run CHKDSK /R on the ...
  41. Iashlpr initialization failed: %1, so DHCP server cannot talk to NPS server. It could be that IAS service is not started. ...
  42. ICACLS name /save aclfile /T /C /L /Q stores the DACLs for the files and folders that match the name into aclfile for later ...
  43. ICACLS name /save aclfile /T /C stores the DACLs for the files and folders that match the name into aclfile for later use ...
  44. ICC profile information: size = %1 bytes, version = %2, class = '%3', data color space = '%4', profile connection space = ...
  45. Id = %1!lu! Name = %2!s! Description = %3!s! Version = %4!s! Vendor name = %5!s! Registration date = %6!s! Initialized = ...
  46. ID Process is the unique identifier of this process. ID Process numbers are reused, so they only identify a process for the ...
  47. Id that is globally unique to each instance of each adapter. This is the value reported by the MSiSCSI_HBAInformation class. ...
  48. ID Thread is the unique identifier of this thread. ID Thread numbers are reused, so they only identify a thread for the lifetime ...
  49. Identifiers issued by a government for purposes of identifying an individual over time, such as a driver's license number, ...
  50. IDENTIFIERS Many of the Bcdedit commands require identifiers. An identifier uniquely identifies entries contained in the ...
  51. Identifies the available character sets for the output of text related to managing the Printer. Strings provided in this ...
  52. Identifies the available languages for strings used by the Printer for the output of management information. The strings ...
  53. Identifies the current language being used by the Printer for management. The language listed in the CurrentNaturalLanguage ...
  54. Identifies the event within the NT Eventlog logfile. This is specific to the logfile and is used together with the logfile ...
  55. Identifies the event. This is specific to the source that generated the event log entry, and is used, together with SourceName, ...
  56. Identifies the GPO that contains this Policy Object.A client-side extension obtains this value fromPGROUP_POLICY_OBJECT->lpDSPath. ...
  57. Identifies the networks to which the computer has connected, collects and stores properties for these networks, and notifies ...
  58. Identifies the specific units in which the accuracy is expressed. The value of this property shall be a legal value of the ...
  59. Identify the users or groups that should have access to the remote desktop server and then add them to the Remote Desktop ...
  60. Identities allow multiple people to use Windows Mail without sharing a common inbox. To create an identity, click the File ...
  61. Identity Federation Support leverages federated trust relationships between your organization and other organizations to ...
  62. Identity Management for UNIX cannot find the computer. Verify that the computer exists on the network and is functioning ...
  63. Identity Management for UNIX cannot find the directory {0}. Verify that the path and directory names are correct, and then ...
  64. Identity Management for UNIX cannot use the specified encryption key. For more information about encryption keys, see "Encryption ...
  65. Identity Management for UNIX cannot use the specified port number. The port number must be an integer from 1 through 65535. ...
  66. identityType, username, password Configures the application pool to run as built-in account, i.e. Application Pool Identity ...
  67. Idle power management features on processor %1 are disabled due to a firmware problem. Check with the computer manufacturer ...
  68. Idle power management features on processor %2 in group %1 are disabled due to a firmware problem. Check with the computer ...
  69. Idle time is a good indicator of disk activity. Disk subsystems sustain various I/O rates and the Idle counter normalized ...
  70. idleTimeout Amount of time (in minutes) a worker process will remain idle before it shuts down. A worker process is idle ...
  71. Idx - Interface (NIC) index used by the system Supp - Interface (NIC) supports TCP chimney offload Atmpt - System has attempted ...
  72. If %s is found on the end-user's machine, it will be configured with the settings underlined in green in this property sheet. ...
  73. If /D was NOT specified on the command line, then when CMD.EXE starts, it looks for the following REG_SZ/REG_EXPAND_SZ registry ...
  74. If a certificate used to encrypt data using Encrypting File System (EFS) is lost, the data cannot be recovered unless a key ...
  75. If a client computer is not running the latest version of RDC, the user will be unable to connect to internal network resources ...