Windows 7

  1. Manages audio devices for the Windows Audio service. If this service is stopped, audio devices and effects will not function ...
  2. Manages audio devices for the Windows Audio service. If this service is stopped, audio devices and effects will not function ...
  3. Manages audio for Windows-based programs. If this service is stopped, audio devices and effects will not function properly. ...
  4. Manages audio for Windows-based programs. If this service is stopped, audio devices and effects will not function properly. ...
  5. Manages authentication, authorization, auditing and accounting for virtual private network (VPN), dial-up, 802.1x wireless ...
  6. Manages authentication, authorization, auditing, and accounting for VPN, dial-up, 802.1x wireless or Ethernet switch connection ...
  7. Manages CD recording using Image Mastering Applications Programming Interface (IMAPI). If this service is stopped, this computer ...
  8. Manages CPU for a local or remote Windows Server 2003, Enterprise and Datacenter Editions. Advanced options permit hard affinity ...
  9. Manages dial-up and virtual private network (VPN) connections from this computer to the Internet or other remote networks. ...
  10. Manages download of game box art and ratings from the Windows Metadata Services. If you enable this setting, game information ...
  11. Manages download of game update information from Windows Metadata Services. If you enable this setting, game update information ...
  12. Manages how Windows controls the setting that specifies how long a computer must be inactive before Windows turns off the ...
  13. Manages Internet SCSI (iSCSI) sessions from this computer to remote iSCSI target devices. If this service is stopped, this ...
  14. Manages objects in the Network and Dial-Up Connections folder, in which you can view both local area network and remote connections. ...
  15. Manages requests made by Pre-Boot eXecution Environment (PXE) - enabled client computers. If this service is stopped, PXE-enabled ...
  16. Manages requests made by Pre-Boot eXecution Environment (PXE) - enabled client computers. If this service is stopped, PXE-enabled ...
  17. Manages software-based volume shadow copies taken by the Volume Shadow Copy service. If this service is stopped, software-based ...
  18. Manages the configuration and tracking of Component Object Model (COM)+-based components. If the service is stopped, most ...
  19. Manages users, computers, security groups and other Active Directory objects through data-driven and task-oriented navigation. ...
  20. Manifest file name is invalid. This name cannot be absolute or relative path, or contain *,?,/,\, ,|, " and space characters. ...
  21. Manual backup and restore allows you to perform an immediate backup or restoration of the WMI repository to/from a file you ...
  22. Manually control the level of acceleration and performance supplied by your graphics hardware. Use the Display Troubleshooter ...
  23. Manually create a network profile This creates a new network profile or locates an existing network and saves a profile for ...
  24. Manufactured under license from Dolby Laboratories. "Dolby" and the double-D symbol are registered trademarks of Dolby Laboratories. ...
  25. Many APIs use much more stack space on NT than Win9x. This compatibility fix is command line driven and takes a list of APIs ...
  26. Many devices include sensors or have sensors installed nearby, in order to measure critical input and output properties. ...
  27. Many devices, such as processors or power supplies, require their own cooling devices. This association indicates where fans ...
  28. Many Internet sites use more than one domain to host their content. You may have to add several domains to the Trusted sites ...
  29. Many Internet sites use more than one domain to host their content. You may have to add several domains to the Trusted sites ...
  30. Many of the application compatibility strategies in Windows XP depend on "matching information", which will help to identify ...
  31. Many organizations have offices located in different geographical locations, requiring remote site connectivity. You can ...
  32. Many organizations use a registration authority (RA) to manage certificate requests. Use the following certificate to sign ...
  33. Many other news readers cannot display HTML messages. If you are posting to a widely read newsgroup, it is recommended that ...
  34. Many Windows 9x applications were not programmed to respond to task switches caused by pressing Alt-Tab, the Windows key, ...
  35. Map cache file doesn't exist or corrupted. Corrective action taken: Regenerating the map cache file. Domain: %1, Map Name: ...
  36. Map drives %1.Choose how you want the contents of the drives on your old computer to get transferred to the drives on your ...
  37. Map is already defined. Current field definition - Key Field Number = '%1',Field Separator = '%2', New field definition - ...
  38. Map user accounts %1.Choose how you want the user accounts on your old computer to get transferred to user accounts on your ...
  39. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  40. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  41. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  42. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  43. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  44. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  45. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  46. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  47. Mapped View Alignment Incorrect} An attempt was made to map a view of a file, but either the specified base address or the ...
  48. March 2001 Application Compatibility Package is incompatible with this version of Windows. All of its features are currently ...
  49. Marking an FT (fault tolerant) volume active will only mark underlying partitions active if they are primary partitions. ...
  50. MASK MASK is relevant only for hardware shadow copies after import. The shadow copy disk is removed from the machine and ...
  51. Master Stats: - Notifies Sent = %1!10lu! Requests = %2!10lu! NameError = %3!10lu! FormError = %4!10lu! Refused = %5!10lu! ...
  52. Matched Effective policy for query name %1: Key Name %2: DnsSecValidationRequired %3, DnsQueryOverIPSec %4, DnsEncryption ...
  53. Mature audience only. This program is specifically designed to be viewed by adults and therefore may be unsuitable for children ...
  54. Max number of concurrent Jet DB sessions. Every volume has its own DB and therefore this parameter is defined per-volume. ...
  55. maxBandwidth Maximum network bandwidth to which the Web site traffic is throttled. A value of -1 indicates that bandwidth ...
  56. MaxBurstLength is not serially greater than FirstBurstLength. Dump data contains FirstBurstLength followed by MaxBurstLength. ...
  57. maxConnections Maximum number of concurrent connections permitted by HTTP.sys. Connections that exceed this limit receive ...
  58. Maximum acceptable directory search response time (in milliseconds). This rule will issue a warning if the search response ...
  59. Maximum amount of time, in seconds, dirty lines or buckets may remain in the cache before they are flushed. A value of zero ...
  60. Maximum Anonymous Users is the maximum number of users who established concurrent anonymous connections using the FTP service ...
  61. Maximum Anonymous Users is the maximum number of users who established concurrent anonymous connections using the Web service ...
  62. Maximum application log size This security setting specifies the maximum size of the application event log, which has a theoretical ...
  63. Maximum CGI Requests is the maximum number of CGI requests simultaneously processed by the Web service (since service startup). ...
  64. Maximum command sequence number is not serially greater than expected command sequence number in login response. Dump data ...
  65. Maximum Connections is the maximum number of concurrent connections established with the Web service (since service startup). ...
  66. Maximum depth below top level has been reached, forcing object to be serialized as strings. Object type at max depth: %1 ...
  67. Maximum depth limit reached when traversing tree, nodes below this level will not be traversed. Possible bug in provider ...
  68. Maximum ISAPI Extension Requests is the maximum number of ISAPI requests simultaneously processed by the Web service (since ...
  69. Maximum length of a filename component supported by the Windows drive. A filename component is that portion of a filename ...
  70. Maximum lifetime for service ticket This security setting determines the maximum amount of time (in minutes) that a granted ...
  71. Maximum lifetime for user ticket renewal This security setting determines the period of time (in days) during which a user's ...
  72. Maximum lifetime for user ticket This security setting determines the maximum amount of time (in hours) that a user's ticket-granting ...
  73. Maximum NonAnonymous Users is the maximum number of concurrent non-anonymous connections to the Web service (since service ...
  74. Maximum NonAnonymous Users is the maximum number of users who established concurrent non-anonymous connections using the ...
  75. Maximum number of directly addressable entities supported by this Controller. A value of 0 should be used if the number is ...