Windows 8.1

  1. Hyper-V Time Synchronization failed to connect to virtual machine '%1' because the version does not match the version expected ...
  2. Hyper-V uses default locations to store virtual hard disk files and virtual machine configuration files, unless you specify ...
  3. Hyper-V Volume Shadow Copy Requestor connected to virtual machine '%1' is using the most recent version (Virtual machine ...
  4. Hyper-V Volume Shadow Copy Requestor connected to virtual machine '%1', but the version does not match the version expected ...
  5. Hyper-V Volume Shadow Copy Requestor failed to connect to virtual machine '%1' because the version does not match the version ...
  6. Hyper-V VSS writer cannot identify the virtual machine with ID '%1'. Please check if there are any corrupt or invalid configuration ...
  7. Hyper-V was unable to perform this operation because the RemoteFX 3D video adapter already exists on this virtual machine. ...
  8. Hyper-V will reserve disk space equal to the amount of memory used by the virtual machine when it is running so that memory ...
  9. I agree that I will manually remove the licenses from the source license server. I understand that if I continue to use the ...
  10. I agree to discontinue using the source license server as a license server with the same licenses that I am migrating. I ...
  11. I have an antivirus program that I'll monitor myself Choose this option if your antivirus program cannot report status to ...
  12. I need help with my computer. Would you please use Windows Remote Assistance to connect to my computer so you can help me? ...
  13. I understand that I am choosing to restore client computer backups, and that doing so may overwrite existing backups. I understand ...
  14. I understand that if I disable the hosted email integration, the server will be unable to manage the hosted email accounts. ...
  15. I understand that music copied from CDs is protected by law, including US and International copyright laws, and that I am ...
  16. I understand that music ripped from CDs is protected by law, including US and International copyright laws, and that I am ...
  17. I understand that this wizard might permanently delete existing backup data while attempting to repair the computer backup ...
  18. I want to restore my Internet security settings myself This option will highlight which Internet settings are not at their ...
  19. I'll turn on %1 myself The publisher has not provided Windows a way to turn on and update the app. Choosing this option will ...
  20. I'll turn on and update %1 myself The publisher has not provided Windows a way to turn on and update the app. Choosing this ...
  21. I/O was attempted on a section object that has been floated as a result of a transaction ending. There is no valid data. ...
  22. I64i! bytes could not be recovered because of bad clusters on the backup image. You can retry the recovery operation using ...
  23. I64i! bytes could not be written to the recovered volume because of bad clusters on the volume (%2). Run CHKDSK /R on the ...
  24. Iashlpr initialization failed: %1, so DHCP server cannot talk to NPS server. It could be that IAS service is not started. ...
  25. ICACLS name /save aclfile /T /C /L /Q stores the DACLs for the files and folders that match the name into aclfile for later ...
  26. ICACLS name /save aclfile /T /C stores the DACLs for the files and folders that match the name into aclfile for later use ...
  27. ICC profile information: size = %1 bytes, version = %2, class = '%3', data color space = '%4', profile connection space = ...
  28. Id = %1!lu! Name = %2!s! Description = %3!s! Version = %4!s! Vendor name = %5!s! Registration date = %6!s! Initialized = ...
  29. Id = %1; ClientMachine = %2; User = %3; ClientProcessId = %4; Component = %5; Operation = %6; ResultCode = %7; PossibleCause ...
  30. ID Process is the unique identifier of this process. ID Process numbers are reused, so they only identify a process for the ...
  31. Id that is globally unique to each instance of each adapter. This is the value reported by the MSiSCSI_HBAInformation class. ...
  32. ID Thread is the unique identifier of this thread. ID Thread numbers are reused, so they only identify a thread for the lifetime ...
  33. Identifiers issued by a government for purposes of identifying an individual over time, such as a driver's license number, ...
  34. IDENTIFIERS Many of the Bcdedit commands require identifiers. An identifier uniquely identifies entries contained in the ...
  35. Identifies the available character sets for the output of text related to managing the Printer. Strings provided in this ...
  36. Identifies the available languages for strings used by the Printer for the output of management information. The strings ...
  37. Identifies the current language being used by the Printer for management. The language listed in the CurrentNaturalLanguage ...
  38. Identifies the event within the NT Eventlog logfile. This is specific to the logfile and is used together with the logfile ...
  39. Identifies the event. This is specific to the source that generated the event log entry, and is used, together with SourceName, ...
  40. Identifies the GPO that contains this Policy Object.A client-side extension obtains this value fromPGROUP_POLICY_OBJECT->lpDSPath. ...
  41. Identifies the networks to which the computer has connected, collects and stores properties for these networks, and notifies ...
  42. Identities allow multiple people to use Windows Mail without sharing a common inbox. To create an identity, click the File ...
  43. Identity federation support for AD RMS cannot be configured until the files that support its use are added. To add identity ...
  44. Identity federation support for AD RMS is already configured on this computer. Please remove it by using the Uninstall-ADRMS ...
  45. Identity Federation Support leverages federated trust relationships between your organization and other organizations to ...
  46. Identity Management for UNIX cannot find the computer. Verify that the computer exists on the network and is functioning ...
  47. Identity Management for UNIX cannot find the directory {0}. Verify that the path and directory names are correct, and then ...
  48. Identity Management for UNIX cannot use the specified encryption key. For more information about encryption keys, see "Encryption ...
  49. Identity Management for UNIX cannot use the specified port number. The port number must be an integer from 1 through 65535. ...
  50. Idle Break Events/sec is the average rate, in incidents per second, at which the processor wakes from idle. This counter ...
  51. Idle power management features on Hyper-V logical processor %2 are disabled due to a firmware problem. Check with the computer ...
  52. Idle power management features on processor %1 are disabled due to a firmware problem. Check with the computer manufacturer ...
  53. Idle power management features on processor %2 in group %1 are disabled due to a firmware problem. Check with the computer ...
  54. Idle time is a good indicator of disk activity. Disk subsystems sustain various I/O rates and the Idle counter normalized ...
  55. Idx - Interface (NIC) index used by the system Supp - Interface (NIC) supports TCP chimney offload Atmpt - System has attempted ...
  56. Idx - Interface (NIC) index used by the system Supp - Interface (NIC) supports TCP RSC Atmpt - System has attempted TCP RSC ...
  57. If %s is found on the end-user's computer, it will be configured with the settings underlined in green in this property sheet. ...
  58. If 'Relay DHCP packets' is not enabled on at least one interface assigned to the IPv4 DHCP Relay Agent routing protocol, ...
  59. If 'Relay DHCP packets' is not enabled on at least one interface assigned to the IPv6 DHCPv6 Relay Agent routing protocol, ...
  60. If 'Remote access server' is not selected, then the server cannot support virtual private network (VPN) or dial-up connections. ...
  61. If /D was NOT specified on the command line, then when CMD.EXE starts, it looks for the following REG_SZ/REG_EXPAND_SZ registry ...
  62. If a client computer is not running the latest version of RDC, the user will be unable to connect to internal network resources ...
  63. If a clustered role is configured to use the current drive letter, changing the drive letter can cause that clustered role ...
  64. If a clustered role is configured to use the current drive letter, changing the drive letter can cause that role to fail. ...
  65. If a clustered role is configured to use the disk, assigning the disk to another role can cause that clustered role to fail. ...
  66. If a domain controller becomes unavailable, client computers that are using the SYSVOL folder of the domain controller might ...
  67. If a domain controller that is running on a VM does not comply with the recommended best practice guidelines, the Active ...
  68. If a driver was provided, make sure it is designed to work with Windows for 32-bit systems. If you do not have an appropriate ...
  69. If a driver was provided, make sure it is designed to work with Windows for ARM-based systems. If you do not have an appropriate ...
  70. If a driver was provided, make sure it is designed to work with Windows for Itanium-based systems. If you do not have an ...
  71. If a driver was provided, make sure it is designed to work with Windows for x64-based systems. If you do not have an appropriate ...
  72. If a file is signed, the wizard will create a rule using the publisher's signature and attributes of the signed file. If ...
  73. If a file is signed, the wizard will create a rule using the publisher's signature and the attributes of the signed file. ...
  74. If a firewall is in use on the failover cluster nodes, configure a firewall rule to allow the coordinator computer to restart ...
  75. If a host name is assigned for port 80 on the default website, you may not be able to connect to some Windows Server Essentials ...