Windows 7

  1. Image Space is the virtual address space in use by the selected image with this protection. Executable memory is memory that ...
  2. Image Space is the virtual address space in use by the selected image with this protection. Execute Write Copy is memory ...
  3. Image Space is the virtual address space in use by the selected image with this protection. Execute/Read Only memory is memory ...
  4. Image Space is the virtual address space in use by the selected image with this protection. Execute/Read/Write memory is ...
  5. Image Space is the virtual address space in use by the selected image with this protection. No Access protection prevents ...
  6. Image Space is the virtual address space in use by the selected image with this protection. Read Only protection prevents ...
  7. Image Space is the virtual address space in use by the selected image with this protection. Read/Write protection allows ...
  8. Image Space is the virtual address space in use by the selected image with this protection. Write Copy protection is used ...
  9. Image with the same name already exists in the %s. If you choose to overwrite then all the images in the file will be lost. ...
  10. image`i`*`Specifies the provider image path. The matching PDB will be located in the Symbol Server. Multiple paths can be ...
  11. IMAP servers can be accessed by multiple e-mail programs at the same time. If you are using two programs to access your mail ...
  12. Immediate steps Because a disk failure will cause you to lose all programs, files and documents on the disk, you should back ...
  13. Impersonate a client after authentication Assigning this privilege to a user allows programs running on behalf of that user ...
  14. Implements stealth-mode filtering by silently dropping all incoming packets for which TCP does not have a listening endpoint. ...
  15. Implements the SMB 1.x (CIFS) protocol. This protocol provides connectivity to network resources on pre-Windows Vista servers ...
  16. Import a trusted user domain from file {0} with the display name being set to "{1}" and the flag of trusting AD federated ...
  17. Import data from the external file into the current database. Changing data in the current database will not change data ...
  18. Import failed because the source file '%1' and the destination file '%2' are different file types. Please check the order ...
  19. Import failed because the source path is not specified for destination resource path '%1'. Please try to run the import again ...
  20. Import failed to configure network connection for network card '%1'. You must modify the connection of all affected network ...
  21. Import failed. Number of parameters supplied for resource paths are not consistent. You should have a SourceResourcePath ...
  22. Import failed. Unable to find virtual machine import files under location '%1'. You can import a virtual machine only if ...
  23. Import failed. Unable to search import files under location '%3'. Error: %1 (%2). You can import a virtual machine only if ...
  24. Import failed. You need to have admin rights to import this Virtual machine since AllowFullScsiCommandSet property is set ...
  25. Import file groups from a file. The syntax of this command is: Filescrn Filegroup Import /File:PATH /Filegroup:FG_NAME | ...
  26. Import from backup is successful. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source GPO:%r ...
  27. Import from backup is successful. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source Template:%r ...
  28. Import from files in XML format resource allocation policies, process matching criteria, calendar events, schedules, conditional ...
  29. IMPORT Import a transportable shadow copy set from a loaded metadata .cab file. Transportable shadow copies are not available ...
  30. Import of backup failed. Error %1]. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source GPO:%r ...
  31. Import of backup failed. Error %1]. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source Template:%r ...
  32. Import templates from a file. The syntax of this command is: Dirquota Template Import /File:PATH /Template:TEMPLATE_NAME ...
  33. Import templates from a file. The syntax of this command is: Filescrn Template Import /File:PATH /Template:TEMPLATE_NAME ...
  34. Import the trusted publishing domain (.xml) file that contains the server licensor certificate, cluster key, and templates ...
  35. Import the trusted user domain (.bin) file that contains the server licensor certificate of the AD RMS cluster to be trusted. ...
  36. Important! Do not press OK until all transforms are added and ordered correctly. For more information, right-click on the ...
  37. IMPORTANT: "netsh firewall" is deprecated; use "netsh advfirewall firewall" instead. For more information on using "netsh ...
  38. IMPORTANT: A connection profile must be created on a computer that uses the same 32-bit or 64-bit processor architecture ...
  39. Important: adding this website to the Trusted sites zone will lower the security settings for all content from this web site ...
  40. Important: adding this website to the Trusted sites zone, will lower the security settings for all content from this website ...
  41. Important: Because you cannot change the user isolation option after creating this FTP site, you should read about FTP user ...
  42. IMPORTANT: Command executed successfully. However, "netsh firewall" is deprecated; use "netsh advfirewall firewall" instead. ...
  43. Important: Computer certificates are the recommended method of authentication. A preshared key is a relatively weak authentication ...
  44. Important: The default settings are not appropriate for servers that have high I/O load. For heavily used servers, you should ...
  45. Important: This option will copy just the application data to the new location - this will not recover the application itself. ...
  46. Important: To allow user to connect remotely to this computer, you must add them to the Remote Desktop Users Group. For step-by-step ...
  47. Important: To prevent data loss, you must have a way to recover BitLocker encryption keys. If you do not allow both recovery ...
  48. Important: You must enable external SSL termination on the SSL bridging product you plan to use and configure it to connect ...
  49. Importing a policy will overwrite all of the current Windows Firewall with Advanced Security policy. If you wish to save ...
  50. Importing policies may take several minutes or longer. Canceling this process or closing this program before import finishes ...
  51. Importing settings will permanently delete this GPO's existing settings. It is therefore recommended that you back up this ...
  52. Importing the computer system from file '{0}' succeeded, but the WMI method or Task object did not return the created computer ...
  53. Importing the Rights Template from trusted publishing domain file has encountered the following error: {0} The Language ID ...
  54. Importing the Rights Template from trusted publishing domain file has encountered the following error: {0} You must remove ...
  55. Importing the Rights Template from trusted publishing domain file has encountered the following error: {0} You must rename ...
  56. Importing this file will cause the existing settings for this RD Gateway server to be overwritten. If you want to save the ...
  57. Imports a foreign disk group into the local computer's online disk group. Syntax: IMPORT NOERR NOERR For scripting only. ...
  58. Imports agreement TS Licensing key packAgreementType is an enumeration of the following values:SELECT=0, ENTERPRISE=1, CAMPUS=2, ...
  59. Imports open TS Licensing key packProductVersion is an enumeration of the following values:Windows 2000 Server=0,Windows ...
  60. Improve your wireless signal quality Windows Help and Support can provide more information about low wireless signal quality ...
  61. Improves system performance by enabling write caching on the device, but a power outage or equipment failure might result ...
  62. In "Revocation Policy" settings, verify that the revocation policy public key file exists and that the file size is between ...
  63. In "User Rights" settings, you must either add at least one user with at least one right for the user, or you must select ...
  64. In a reduction of attack surface, retired protocols are no longer supported. This feature disables the MK protocol. Resources ...
  65. In a Remote Desktop Session Host server pool, this feature allows a user to reconnect to a Remote Desktop Session Host server ...
  66. In addition to basic information, the program sends more information to Microsoft about spyware and potentially unwanted ...
  67. In addition to enabling DNS clients to locate network resources by name, DNS also provides information about network services ...
  68. In addition to obtaining a new certificate for your certification authority (CA), you also have the option of generating ...
  69. In addition to sending and receiving e-mail, you can use Windows Mail to read newsgroups, which are Internet discussion forums ...
  70. In addition, substitution of FOR variable references has been enhanced. You can now use the following optional syntax: %~I ...
  71. In administrator mode, users can deploy and maintain applications. Users have access to all features except they cannot create ...
  72. In an environment of connected systems that are built on the .NET Framework, deploying .NET Framework 3.5.1 enables the seamless ...
  73. in an invalid port range. A valid port range is two positive integers between 1025 and 65535 that are separated by a hyphen ...
  74. In as few as 10 minutes, you can add new features to Windows 7 and do more with your PC. It's easy, quick, and you'll keep ...
  75. In expiration policy settings, the use license expiration duration will not be saved unless you add at least one user or ...