Windows 7
- Image Space is the virtual address space in use by the selected image with this protection. Executable memory is memory that ...
- Image Space is the virtual address space in use by the selected image with this protection. Execute Write Copy is memory ...
- Image Space is the virtual address space in use by the selected image with this protection. Execute/Read Only memory is memory ...
- Image Space is the virtual address space in use by the selected image with this protection. Execute/Read/Write memory is ...
- Image Space is the virtual address space in use by the selected image with this protection. No Access protection prevents ...
- Image Space is the virtual address space in use by the selected image with this protection. Read Only protection prevents ...
- Image Space is the virtual address space in use by the selected image with this protection. Read/Write protection allows ...
- Image Space is the virtual address space in use by the selected image with this protection. Write Copy protection is used ...
- Image with the same name already exists in the %s. If you choose to overwrite then all the images in the file will be lost. ...
- image`i`*`Specifies the provider image path. The matching PDB will be located in the Symbol Server. Multiple paths can be ...
- IMAP servers can be accessed by multiple e-mail programs at the same time. If you are using two programs to access your mail ...
- Immediate steps Because a disk failure will cause you to lose all programs, files and documents on the disk, you should back ...
- Impersonate a client after authentication Assigning this privilege to a user allows programs running on behalf of that user ...
- Implements stealth-mode filtering by silently dropping all incoming packets for which TCP does not have a listening endpoint. ...
- Implements the SMB 1.x (CIFS) protocol. This protocol provides connectivity to network resources on pre-Windows Vista servers ...
- Import a trusted user domain from file {0} with the display name being set to "{1}" and the flag of trusting AD federated ...
- Import data from the external file into the current database. Changing data in the current database will not change data ...
- Import failed because the source file '%1' and the destination file '%2' are different file types. Please check the order ...
- Import failed because the source path is not specified for destination resource path '%1'. Please try to run the import again ...
- Import failed to configure network connection for network card '%1'. You must modify the connection of all affected network ...
- Import failed. Number of parameters supplied for resource paths are not consistent. You should have a SourceResourcePath ...
- Import failed. Unable to find virtual machine import files under location '%1'. You can import a virtual machine only if ...
- Import failed. Unable to search import files under location '%3'. Error: %1 (%2). You can import a virtual machine only if ...
- Import failed. You need to have admin rights to import this Virtual machine since AllowFullScsiCommandSet property is set ...
- Import file groups from a file. The syntax of this command is: Filescrn Filegroup Import /File:PATH /Filegroup:FG_NAME | ...
- Import from backup is successful. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source GPO:%r ...
- Import from backup is successful. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source Template:%r ...
- Import from files in XML format resource allocation policies, process matching criteria, calendar events, schedules, conditional ...
- IMPORT Import a transportable shadow copy set from a loaded metadata .cab file. Transportable shadow copies are not available ...
- Import of backup failed. Error %1]. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source GPO:%r ...
- Import of backup failed. Error %1]. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source Template:%r ...
- Import templates from a file. The syntax of this command is: Dirquota Template Import /File:PATH /Template:TEMPLATE_NAME ...
- Import templates from a file. The syntax of this command is: Filescrn Template Import /File:PATH /Template:TEMPLATE_NAME ...
- Import the trusted publishing domain (.xml) file that contains the server licensor certificate, cluster key, and templates ...
- Import the trusted user domain (.bin) file that contains the server licensor certificate of the AD RMS cluster to be trusted. ...
- Important! Do not press OK until all transforms are added and ordered correctly. For more information, right-click on the ...
- IMPORTANT: "netsh firewall" is deprecated; use "netsh advfirewall firewall" instead. For more information on using "netsh ...
- IMPORTANT: A connection profile must be created on a computer that uses the same 32-bit or 64-bit processor architecture ...
- Important: adding this website to the Trusted sites zone will lower the security settings for all content from this web site ...
- Important: adding this website to the Trusted sites zone, will lower the security settings for all content from this website ...
- Important: Because you cannot change the user isolation option after creating this FTP site, you should read about FTP user ...
- IMPORTANT: Command executed successfully. However, "netsh firewall" is deprecated; use "netsh advfirewall firewall" instead. ...
- Important: Computer certificates are the recommended method of authentication. A preshared key is a relatively weak authentication ...
- Important: The default settings are not appropriate for servers that have high I/O load. For heavily used servers, you should ...
- Important: This option will copy just the application data to the new location - this will not recover the application itself. ...
- Important: To allow user to connect remotely to this computer, you must add them to the Remote Desktop Users Group. For step-by-step ...
- Important: To prevent data loss, you must have a way to recover BitLocker encryption keys. If you do not allow both recovery ...
- Important: You must enable external SSL termination on the SSL bridging product you plan to use and configure it to connect ...
- Importing a policy will overwrite all of the current Windows Firewall with Advanced Security policy. If you wish to save ...
- Importing policies may take several minutes or longer. Canceling this process or closing this program before import finishes ...
- Importing settings will permanently delete this GPO's existing settings. It is therefore recommended that you back up this ...
- Importing the computer system from file '{0}' succeeded, but the WMI method or Task object did not return the created computer ...
- Importing the Rights Template from trusted publishing domain file has encountered the following error: {0} The Language ID ...
- Importing the Rights Template from trusted publishing domain file has encountered the following error: {0} You must remove ...
- Importing the Rights Template from trusted publishing domain file has encountered the following error: {0} You must rename ...
- Importing this file will cause the existing settings for this RD Gateway server to be overwritten. If you want to save the ...
- Imports a foreign disk group into the local computer's online disk group. Syntax: IMPORT NOERR NOERR For scripting only. ...
- Imports agreement TS Licensing key packAgreementType is an enumeration of the following values:SELECT=0, ENTERPRISE=1, CAMPUS=2, ...
- Imports open TS Licensing key packProductVersion is an enumeration of the following values:Windows 2000 Server=0,Windows ...
- Improve your wireless signal quality Windows Help and Support can provide more information about low wireless signal quality ...
- Improves system performance by enabling write caching on the device, but a power outage or equipment failure might result ...
- In "Revocation Policy" settings, verify that the revocation policy public key file exists and that the file size is between ...
- In "User Rights" settings, you must either add at least one user with at least one right for the user, or you must select ...
- In a reduction of attack surface, retired protocols are no longer supported. This feature disables the MK protocol. Resources ...
- In a Remote Desktop Session Host server pool, this feature allows a user to reconnect to a Remote Desktop Session Host server ...
- In addition to basic information, the program sends more information to Microsoft about spyware and potentially unwanted ...
- In addition to enabling DNS clients to locate network resources by name, DNS also provides information about network services ...
- In addition to obtaining a new certificate for your certification authority (CA), you also have the option of generating ...
- In addition to sending and receiving e-mail, you can use Windows Mail to read newsgroups, which are Internet discussion forums ...
- In addition, substitution of FOR variable references has been enhanced. You can now use the following optional syntax: %~I ...
- In administrator mode, users can deploy and maintain applications. Users have access to all features except they cannot create ...
- In an environment of connected systems that are built on the .NET Framework, deploying .NET Framework 3.5.1 enables the seamless ...
- in an invalid port range. A valid port range is two positive integers between 1025 and 65535 that are separated by a hyphen ...
- In as few as 10 minutes, you can add new features to Windows 7 and do more with your PC. It's easy, quick, and you'll keep ...
- In expiration policy settings, the use license expiration duration will not be saved unless you add at least one user or ...