Windows 7
- In Internet Explorer, you can configure security settings for several built-in security zones: the Internet zone, the Local ...
- In Internet Explorer, you can configure security settings for several built-in security zones: the Internet zone, the Local ...
- In NT 4, GetShortPathName did not care if the file existed - it would give the short path name anyway. This behavior was ...
- In order for %s to run on your IIS Web server, the following files must be enabled. Disabling or removing a file might cause ...
- In order for AD RMS clients to discover this cluster, you must register the AD RMS service connection point (SCP) in "{0}" ...
- In order for AD RMS clients to discover this cluster, you must register the AD RMS service connection point (SCP) in this ...
- In order for AD RMS clients to discover this cluster, you must register the AD RMS service connection point in "{0}" Active ...
- In order for AD RMS clients to discover this cluster, you must register the AD RMS service connection point in this Active ...
- In order for Scan Management to display scan server logs, you must enable Remote Event Log Management in Windows Firewall ...
- In order for the changes to the RADIUS authentication or accounting ports to take effect, the service must be stopped (if ...
- In order for this domain controller to be located by other domain members and domain controllers, the A record corresponding ...
- In order for this domain controller to be located by other domain members and domain controllers, the domain controller Locator ...
- In order for your changes to take effect, you must restart Windows. Save your work and close all programs, then click Restart ...
- In order for your phone book to be downloaded properly, the phone book name must be eight characters or less and it cannot ...
- In order to castle, neither the King nor the Rook involved may have moved yet. Also, the King may not castle out of check, ...
- In order to check the status of a certificate, a revocation configuration for the Online Responder must identify the CA that ...
- In order to check the status of a certificate, a revocation configuration for the Online Responder must identify the CA that ...
- In order to check the status of a certificate, a revocation configuration for the Online Responder must identify the CA that ...
- In order to complete the installation of 2], you must restart the computer. Other users are currently logged on to this computer, ...
- In order to deploy these packages to clients, you must add them to a driver group. A package can be in many driver groups, ...
- In order to dial correctly, your computer might require additional information, such as a calling-card number or the area ...
- In order to import the trusted publishing domain of "{0}", the drive's current location must be reset from {1} to {2}. Do ...
- In order to install Active Directory Domain Services, you must first make these ports available by removing or reconfiguring ...
- In order to perform this function, Windows Mail needs to Demand Install some files. Unfortunately your administrator has ...
- In order to refresh the drive {0}, it must reset its current location from {1} to drive root {2}. Do you want to continue? ...
- In order to remotely administer the cluster the remote registry service is required to be running. If cluster nodes are starting ...
- In order to remove the selected item {0}, the drive's current location must be reset from {1} to {2}. Are you sure you want ...
- In order to run UNIX-based scripts and custom UNIX-based applications, download the Utilities and SDK for Subsystem for UNIX-based ...
- In order to send encrypted mail to this person, you must add the digital ID to your contacts. Click the add button to create ...
- In order to set administrative callback mode, either you must specify a callback number or the user must already have a callback ...
- In order to setup DirectAccess Monitoring, you must select which interfaces connect the Internet and the internal network. ...
- In order to setup your DirectAccess server, you must select which interfaces connect to the Internet and the internal network. ...
- In order to share this printer, Windows Firewall must be configured to allow this printer to be shared with other computers ...
- In order to share this printer, Windows Firewall will be configured to allow this printer to be shared with other computers ...
- In order to transfer music to your Creative Nomad digital audio player, you must upgrade to version 2.50 or later. The update ...
- In order to use the SSLCertificateSHA1Hash WMI property, you mustfirst find the hexadecimal Thumbprint value for the certificatethat ...
- In particular, there is at least one node ({0}) that has only IPv4 addresses and at least one node ({1}) that has only IPv6 ...
- In previous versions of Windows with Internet Explorer, some Web pages could access objects cached from another Web site. ...
- In some editions of Windows, the disk might include file shadow copies and older Windows Complete PC Backup images as part ...
- In Templates Management, you create and modify NPS templates. NPS templates allow you to create and save an NPS component ...
- in the AD RMS logging database has been decrypted successfully. Click Search Report in the Actions pane to locate specific ...
- In the case of an LDAP-derived instance, the ObjectClass property value(s) may be set to the objectClass attribute values. ...
- In the case of an LDAP-derived instance, the SeeAlso property specifies distinguished name of other Directory objects which ...
- In the case of an LDAP-derived instance, the UserPassword property may contain an encrypted password used to access the person's ...
- In the event of a failure on the domain's only domain controller, users will not be able to log in to the domain or access ...
- In the event of data loss or disk failure, you can reset the password that protects the AD RMS cluster key. If you used the ...
- In the event of data loss or disk failure, you can reset the password that protects the AD RMS cluster key. This policy setting ...
- In the IIS Software Development Kit (SDK) or at the MSDN Online Library , search for topics titled Debugging ASP Scripts ...
- In the internal DTD subset, parameter entity references can occur only where markup declarations can occur, not within markup ...
- In the list bellow, top values take precedence over lower values during classification. Lower values may be overridden by ...
- In the Password Replication Policy, you can specify whose passwords are allowed to replicate to the read-only domain controller ...
- In the past %1 hour(s) and %2 minute(s), %3 HTTP.SYS responses have had their application requested QoS conflict with URL ...
- In the Start menu you can choose a computer activity, such as reading new e-mail messages or browsing the Web. This menu ...
- In the value for parameter {0} double quotes were not used, but required. Double quotes are required for all values that ...
- In this topology, each member replicates with all other members of the replication group. This topology works well when there ...
- In Windows 2003 and earlier versions of Windows, the Remote Procedure Call (RPC) Locator service manages the RPC name service ...
- In Windows 9x applications could restart the computer by calling the ExitWindowsEx API. Windows XP requires the application ...
- In Windows 9x, DirectDraw manipulates the palette directly without using GDI, while on NT it uses GDI. Therefore, if an application ...
- In Windows 9x, the DrawText API would accept out of range values and then convert them to acceptable values. This compatibility ...
- In Windows Explorer, Internet Explorer, or any other process which opts into the security restriction, Network Protocol Lockdown ...
- In Windows XP, applications are restricted from modifying the system menu. Instead, each application gets a separate copy ...
- In Windows XP, due to a modification in the caching between MoveFile and DeleteFile API's, when the VerInstallFileW API is ...
- In Windows XP, the WS_EX_CLIENTEDGE window style causes applications to run with the taskbar still visible. This may not ...
- In Windows XP, we have changed foreground semantics to stop foreground focus stealing by one app if another application is ...
- InactivityTimeout defines the time limit (in seconds) for automatic disconnection of the phone line, if no data is exchanged. ...
- Inbound Allowed Default Block Exempt Packets is the total number of default block exempt packets forwarded from a public ...
- Inbound Allowed Default Block Exempt Packets per Second is the rate at which default block exempt packets are forwarded from ...
- Inbound Allowed Filter Exempt IPv6 Packets is the total number of IPv6 filter exempt packets forwarded from a public interface ...
- Inbound Allowed Filter Exempt IPv6 Packets per Second is the rate at which IPv6 filter exempt packets are forwarded from ...
- Inbound Allowed ICMPv6 Packets is the total number of ICMPv6 packets forwarded from a public interface to an internal interface. ...
- Inbound Allowed ICMPv6 Packets per Second is the rate at which ICMPv6 packets are forwarded from a public interface to an ...
- Inbound Allowed IPv6 IPsec Authenticated Packets is the total number of authenticated IKEv1, IKEv2, AuthIP, or ESP IPv6 packets ...
- Inbound Allowed IPv6 IPsec Authenticated Packets per Second is the rate at which authenticated IKEv1, IKEv2, AuthIP or ESP ...
- Inbound Allowed IPv6 IPsec Unauthenticated Packets is the total number of unauthenticated IKEv1, IKEv2, AuthIP, or ESP IPv6 ...
- Inbound Allowed IPv6 IPsec Unauthenticated Packets per Second is the rate at which unauthenticated IKEv1, IKEv2, AuthIP, ...