Windows 7

  1. Internet Connection Sharing and/or Internet Connection Firewall is currently enabled for a network connection, and must be ...
  2. Internet Connection Sharing is currently enabled for connection '%1'. It will now be enabled for connection '%2' instead. ...
  3. Internet Connection Sharing is currently enabled for connection '%1'. It will now be enabled for connection '%2' instead. ...
  4. Internet Control Message Protocol (ICMP) allows the computers on a network to share error and status information. Select ...
  5. Internet Control Message Protocol (ICMP) allows the computers on a network to share error and status information. Select ...
  6. Internet Explorer 6 lets you specify a custom Search bar URL which opens in a separate frame when the user clicks on the ...
  7. Internet Explorer allows scripts to programmatically open, resize, and reposition windows of various types. The Window Restrictions ...
  8. Internet Explorer allows scripts to programmatically open, resize, and reposition windows of various types. The Window Restrictions ...
  9. Internet Explorer allows scripts to programmatically open, resize, and reposition windows of various types. The Window Restrictions ...
  10. Internet Explorer allows users and administrators to decide which add-ons are permitted to load. Applications hosting the ...
  11. Internet Explorer cannot connect to the website for this Web Slice. Check your Internet connection, and click the button ...
  12. Internet Explorer cannot connect to the website for this Web Slice. Click the button to try to open the webpage for this ...
  13. Internet Explorer contains dynamic binary behaviors: components that encapsulate specific functionality for HTML elements ...
  14. Internet Explorer contains dynamic binary behaviors: components that encapsulate specific functionality for the HTML elements ...
  15. Internet Explorer contains dynamic binary behaviors: components that encapsulate specific functionality for the HTML elements ...
  16. Internet Explorer contains dynamic binary behaviors: components that encapsulate specific functionality for the HTML elements ...
  17. Internet Explorer could not search using this search provider. There was a problem with the search provider's information. ...
  18. Internet Explorer Enhanced Security Configuration (IE ESC) reduces the exposure of your server to potential attacks from ...
  19. Internet Explorer Enhanced Security Configuration adjusts the security levels for the existing security zones. The following ...
  20. Internet Explorer Enhanced Security Configuration allows you to control the level of Internet Explorer access allowed to ...
  21. Internet Explorer Enhanced Security Configuration allows you to control the level of Internet Explorer access allowed to ...
  22. Internet Explorer Enhanced Security Configuration is an option that is provided in Windows Server 2003 operating systems ...
  23. Internet Explorer Enhanced Security Configuration is currently enabled on your server. This configures a number of security ...
  24. Internet Explorer Enhanced Security Configuration is designed to reduce your server's exposure to security threats. To ensure ...
  25. Internet Explorer Enhanced Security Configuration is designed to reduce your server's exposure to security threats. To ensure ...
  26. Internet Explorer Enhanced Security Configuration places your server and Internet Explorer in a configuration that decreases ...
  27. Internet Explorer Enhanced Security Configuration places your server and Microsoft Internet Explorer in a configuration that ...
  28. Internet Explorer has automatically configured a proxy server for this connection. Is a proxy server used on this connection? ...
  29. Internet Explorer has blocked this site from using an ActiveX control in an unsafe manner. As a result, this page might not ...
  30. Internet Explorer maintains two different lists of sites for the Local intranet zone. One list is in effect when Enhanced ...
  31. Internet Explorer maintains two different lists of sites for the Local intranet zone. One list is in effect when the enhanced ...
  32. Internet Explorer maintains two different lists of sites for the Trusted sites zone. One list is in effect when Enhanced ...
  33. Internet Explorer maintains two different lists of sites for the Trusted Sites zone. One list is in effect when the enhanced ...
  34. Internet Explorer may be configured to prevent active content obtained through restricted protocols from running in an unsafe ...
  35. Internet Explorer may be configured to prevent active content obtained through restricted protocols from running in an unsafe ...
  36. Internet Explorer needs to open a new window to display this webpage. For your computer's security, websites that are in ...
  37. Internet Explorer places restrictions on each Web page it opens. The restrictions are dependent upon the location of the ...
  38. Internet Explorer places restrictions on each Web page it opens. The restrictions are dependent upon the location of the ...
  39. Internet Explorer places restrictions on each Web page it opens. The restrictions are dependent upon the location of the ...
  40. Internet Explorer places zone restrictions on each Web page it opens, which are dependent upon the location of the Web page ...
  41. Internet Explorer places zone restrictions on each Web page it opens, which are dependent upon the location of the Web page ...
  42. Internet Explorer places zone restrictions on each Web page it opens, which are dependent upon the location of the Web page ...
  43. Internet Explorer provides the capability for scripts to programmatically open additional windows of various types, and to ...
  44. Internet Explorer Setup can be customized by adding custom components, selecting the components to install, specifying download ...
  45. Internet Explorer treats as fatal any Secure Socket Layer/Transport Layer Security (SSL/TLS) certificate errors that interrupt ...
  46. Internet Explorer uses Multipurpose Internet Mail Extensions (MIME) data to determine file handling procedures for files ...
  47. Internet Explorer uses Multipurpose Internet Mail Extensions (MIME) data to determine file handling procedures for files ...
  48. Internet Explorer uses Multipurpose Internet Mail Extensions (MIME) data to determine file handling procedures for files ...
  49. Internet Explorer uses Multipurpose Internet Mail Extensions (MIME) type information to decide how to handle files that have ...
  50. Internet Explorer was unable to delete this network connection because it is currently in use. Close the connection and try ...
  51. Internet Information Services (IIS) is a full-featured Web server with a fault-tolerant process model that increases the ...
  52. Internet Information Services (IIS) is not installed on this computer. Active Directory Certificate Services Web Enrollment ...
  53. Internet Information Services provides support for Web and FTP servers, along with support for ASP.NET web sites, dynamic ...
  54. Internet Information Services provides support for Web and FTP servers, along with support for dynamic content such as Classic ...
  55. Internet management systems may request the contact person, system location, and network services for this computer from ...
  56. Internet Printing Client enables clients to use Internet Printing Protocol (IPP) to connect and print to printers on the ...
  57. Internet Printing creates a Web site where users can manage print jobs on the server. It also enables users who have Internet ...
  58. Internet Printing creates a Web site where users can manage print jobs on the server. It also enables users who have Internet ...
  59. Internet Protocol Security (IPsec) Administration. Manage IPsec policies for secure communication with other computers. Portions ...
  60. Internet Protocol security (IPsec) supports network-level peer authentication, data origin authentication, data integrity, ...
  61. Internet security settings are not set to their recommended levels. Windows can't help restore your Internet security settings ...
  62. Internet Server Application Programming Interface (ISAPI) Extensions provides support for dynamic Web content developing ...
  63. Internet Server Application Programming Interface (ISAPI) Filters provides support for Web applications that use ISAPI filters. ...
  64. Internet Settings policy allows an administrator to manage settings that are available in the "Internet Options" Control ...
  65. Internet Shinchakubin 1.00 - 1.40 has a known compatibility issue with this version of Windows. For an update that is compatible ...
  66. Internet Storage Name Server (iSNS) provides discovery services for Internet Small Computer System Interface (iSCSI) storage ...
  67. Internet Storage Naming Server (iSNS) processes registration requests, de-registration requests, and queries from iSCSI devices. ...
  68. Internet synchronizer exited unexpectedly on the server. Look at the exchange history in the partner replica on the internet ...
  69. Internet synchronizer exited unexpectedly on the server. Look at the partner replica exchange history on the internet server ...
  70. InterpretationOfFalse is a string indicating what a 'False' value from the binary sensor means. This information could be ...
  71. InterpretationOfTrue is a string indicating what a 'True' value from the Binary sensor means. This information could be displayed ...
  72. Interrupt Cycles/sec is the average rate, in cycles per second, at which NDIS processed hardware interrupts for an interface. ...
  73. Interrupt DPC Cycles/sec is the average rate, in cycles per second, at which NDIS processed a Deferred Procedure Call (DPC) ...
  74. Interrupt Time is the time the processor spends receiving and servicing hardware interrupts during sample intervals. This ...
  75. Interrupts/sec is the average rate, in incidents per second, at which NDIS received and serviced hardware interrupts for ...