Windows 7

  1. In Internet Explorer, you can configure security settings for several built-in security zones: the Internet zone, the Local ...
  2. In Internet Explorer, you can configure security settings for several built-in security zones: the Internet zone, the Local ...
  3. In NT 4, GetShortPathName did not care if the file existed - it would give the short path name anyway. This behavior was ...
  4. In order for %s to run on your IIS Web server, the following files must be enabled. Disabling or removing a file might cause ...
  5. In order for AD RMS clients to discover this cluster, you must register the AD RMS service connection point (SCP) in "{0}" ...
  6. In order for AD RMS clients to discover this cluster, you must register the AD RMS service connection point (SCP) in this ...
  7. In order for AD RMS clients to discover this cluster, you must register the AD RMS service connection point in "{0}" Active ...
  8. In order for AD RMS clients to discover this cluster, you must register the AD RMS service connection point in this Active ...
  9. In order for Scan Management to display scan server logs, you must enable Remote Event Log Management in Windows Firewall ...
  10. In order for the changes to the RADIUS authentication or accounting ports to take effect, the service must be stopped (if ...
  11. In order for this domain controller to be located by other domain members and domain controllers, the A record corresponding ...
  12. In order for this domain controller to be located by other domain members and domain controllers, the domain controller Locator ...
  13. In order for your changes to take effect, you must restart Windows. Save your work and close all programs, then click Restart ...
  14. In order for your phone book to be downloaded properly, the phone book name must be eight characters or less and it cannot ...
  15. In order to castle, neither the King nor the Rook involved may have moved yet. Also, the King may not castle out of check, ...
  16. In order to check the status of a certificate, a revocation configuration for the Online Responder must identify the CA that ...
  17. In order to check the status of a certificate, a revocation configuration for the Online Responder must identify the CA that ...
  18. In order to check the status of a certificate, a revocation configuration for the Online Responder must identify the CA that ...
  19. In order to complete the installation of 2], you must restart the computer. Other users are currently logged on to this computer, ...
  20. In order to deploy these packages to clients, you must add them to a driver group. A package can be in many driver groups, ...
  21. In order to dial correctly, your computer might require additional information, such as a calling-card number or the area ...
  22. In order to import the trusted publishing domain of "{0}", the drive's current location must be reset from {1} to {2}. Do ...
  23. In order to install Active Directory Domain Services, you must first make these ports available by removing or reconfiguring ...
  24. In order to perform this function, Windows Mail needs to Demand Install some files. Unfortunately your administrator has ...
  25. In order to refresh the drive {0}, it must reset its current location from {1} to drive root {2}. Do you want to continue? ...
  26. In order to remotely administer the cluster the remote registry service is required to be running. If cluster nodes are starting ...
  27. In order to remove the selected item {0}, the drive's current location must be reset from {1} to {2}. Are you sure you want ...
  28. In order to run UNIX-based scripts and custom UNIX-based applications, download the Utilities and SDK for Subsystem for UNIX-based ...
  29. In order to send encrypted mail to this person, you must add the digital ID to your contacts. Click the add button to create ...
  30. In order to set administrative callback mode, either you must specify a callback number or the user must already have a callback ...
  31. In order to setup DirectAccess Monitoring, you must select which interfaces connect the Internet and the internal network. ...
  32. In order to setup your DirectAccess server, you must select which interfaces connect to the Internet and the internal network. ...
  33. In order to share this printer, Windows Firewall must be configured to allow this printer to be shared with other computers ...
  34. In order to share this printer, Windows Firewall will be configured to allow this printer to be shared with other computers ...
  35. In order to transfer music to your Creative Nomad digital audio player, you must upgrade to version 2.50 or later. The update ...
  36. In order to use the SSLCertificateSHA1Hash WMI property, you mustfirst find the hexadecimal Thumbprint value for the certificatethat ...
  37. In particular, there is at least one node ({0}) that has only IPv4 addresses and at least one node ({1}) that has only IPv6 ...
  38. In previous versions of Windows with Internet Explorer, some Web pages could access objects cached from another Web site. ...
  39. In some editions of Windows, the disk might include file shadow copies and older Windows Complete PC Backup images as part ...
  40. In Templates Management, you create and modify NPS templates. NPS templates allow you to create and save an NPS component ...
  41. in the AD RMS logging database has been decrypted successfully. Click Search Report in the Actions pane to locate specific ...
  42. In the case of an LDAP-derived instance, the ObjectClass property value(s) may be set to the objectClass attribute values. ...
  43. In the case of an LDAP-derived instance, the SeeAlso property specifies distinguished name of other Directory objects which ...
  44. In the case of an LDAP-derived instance, the UserPassword property may contain an encrypted password used to access the person's ...
  45. In the event of a failure on the domain's only domain controller, users will not be able to log in to the domain or access ...
  46. In the event of data loss or disk failure, you can reset the password that protects the AD RMS cluster key. If you used the ...
  47. In the event of data loss or disk failure, you can reset the password that protects the AD RMS cluster key. This policy setting ...
  48. In the IIS Software Development Kit (SDK) or at the MSDN Online Library , search for topics titled Debugging ASP Scripts ...
  49. In the internal DTD subset, parameter entity references can occur only where markup declarations can occur, not within markup ...
  50. In the list bellow, top values take precedence over lower values during classification. Lower values may be overridden by ...
  51. In the Password Replication Policy, you can specify whose passwords are allowed to replicate to the read-only domain controller ...
  52. In the past %1 hour(s) and %2 minute(s), %3 HTTP.SYS responses have had their application requested QoS conflict with URL ...
  53. In the Start menu you can choose a computer activity, such as reading new e-mail messages or browsing the Web. This menu ...
  54. In the value for parameter {0} double quotes were not used, but required. Double quotes are required for all values that ...
  55. In this topology, each member replicates with all other members of the replication group. This topology works well when there ...
  56. In Windows 2003 and earlier versions of Windows, the Remote Procedure Call (RPC) Locator service manages the RPC name service ...
  57. In Windows 9x applications could restart the computer by calling the ExitWindowsEx API. Windows XP requires the application ...
  58. In Windows 9x, DirectDraw manipulates the palette directly without using GDI, while on NT it uses GDI. Therefore, if an application ...
  59. In Windows 9x, the DrawText API would accept out of range values and then convert them to acceptable values. This compatibility ...
  60. In Windows Explorer, Internet Explorer, or any other process which opts into the security restriction, Network Protocol Lockdown ...
  61. In Windows XP, applications are restricted from modifying the system menu. Instead, each application gets a separate copy ...
  62. In Windows XP, due to a modification in the caching between MoveFile and DeleteFile API's, when the VerInstallFileW API is ...
  63. In Windows XP, the WS_EX_CLIENTEDGE window style causes applications to run with the taskbar still visible. This may not ...
  64. In Windows XP, we have changed foreground semantics to stop foreground focus stealing by one app if another application is ...
  65. InactivityTimeout defines the time limit (in seconds) for automatic disconnection of the phone line, if no data is exchanged. ...
  66. Inbound Allowed Default Block Exempt Packets is the total number of default block exempt packets forwarded from a public ...
  67. Inbound Allowed Default Block Exempt Packets per Second is the rate at which default block exempt packets are forwarded from ...
  68. Inbound Allowed Filter Exempt IPv6 Packets is the total number of IPv6 filter exempt packets forwarded from a public interface ...
  69. Inbound Allowed Filter Exempt IPv6 Packets per Second is the rate at which IPv6 filter exempt packets are forwarded from ...
  70. Inbound Allowed ICMPv6 Packets is the total number of ICMPv6 packets forwarded from a public interface to an internal interface. ...
  71. Inbound Allowed ICMPv6 Packets per Second is the rate at which ICMPv6 packets are forwarded from a public interface to an ...
  72. Inbound Allowed IPv6 IPsec Authenticated Packets is the total number of authenticated IKEv1, IKEv2, AuthIP, or ESP IPv6 packets ...
  73. Inbound Allowed IPv6 IPsec Authenticated Packets per Second is the rate at which authenticated IKEv1, IKEv2, AuthIP or ESP ...
  74. Inbound Allowed IPv6 IPsec Unauthenticated Packets is the total number of unauthenticated IKEv1, IKEv2, AuthIP, or ESP IPv6 ...
  75. Inbound Allowed IPv6 IPsec Unauthenticated Packets per Second is the rate at which unauthenticated IKEv1, IKEv2, AuthIP, ...