Windows 7
- Manages audio devices for the Windows Audio service. If this service is stopped, audio devices and effects will not function ...
- Manages audio devices for the Windows Audio service. If this service is stopped, audio devices and effects will not function ...
- Manages audio for Windows-based programs. If this service is stopped, audio devices and effects will not function properly. ...
- Manages audio for Windows-based programs. If this service is stopped, audio devices and effects will not function properly. ...
- Manages authentication, authorization, auditing and accounting for virtual private network (VPN), dial-up, 802.1x wireless ...
- Manages authentication, authorization, auditing, and accounting for VPN, dial-up, 802.1x wireless or Ethernet switch connection ...
- Manages CD recording using Image Mastering Applications Programming Interface (IMAPI). If this service is stopped, this computer ...
- Manages CPU for a local or remote Windows Server 2003, Enterprise and Datacenter Editions. Advanced options permit hard affinity ...
- Manages dial-up and virtual private network (VPN) connections from this computer to the Internet or other remote networks. ...
- Manages download of game box art and ratings from the Windows Metadata Services. If you enable this setting, game information ...
- Manages download of game update information from Windows Metadata Services. If you enable this setting, game update information ...
- Manages how Windows controls the setting that specifies how long a computer must be inactive before Windows turns off the ...
- Manages Internet SCSI (iSCSI) sessions from this computer to remote iSCSI target devices. If this service is stopped, this ...
- Manages objects in the Network and Dial-Up Connections folder, in which you can view both local area network and remote connections. ...
- Manages requests made by Pre-Boot eXecution Environment (PXE) - enabled client computers. If this service is stopped, PXE-enabled ...
- Manages requests made by Pre-Boot eXecution Environment (PXE) - enabled client computers. If this service is stopped, PXE-enabled ...
- Manages software-based volume shadow copies taken by the Volume Shadow Copy service. If this service is stopped, software-based ...
- Manages the configuration and tracking of Component Object Model (COM)+-based components. If the service is stopped, most ...
- Manages users, computers, security groups and other Active Directory objects through data-driven and task-oriented navigation. ...
- Manifest file name is invalid. This name cannot be absolute or relative path, or contain *,?,/,\, ,|, " and space characters. ...
- Manual backup and restore allows you to perform an immediate backup or restoration of the WMI repository to/from a file you ...
- Manually control the level of acceleration and performance supplied by your graphics hardware. Use the Display Troubleshooter ...
- Manually create a network profile This creates a new network profile or locates an existing network and saves a profile for ...
- Manufactured under license from Dolby Laboratories. "Dolby" and the double-D symbol are registered trademarks of Dolby Laboratories. ...
- Many APIs use much more stack space on NT than Win9x. This compatibility fix is command line driven and takes a list of APIs ...
- Many devices include sensors or have sensors installed nearby, in order to measure critical input and output properties. ...
- Many devices, such as processors or power supplies, require their own cooling devices. This association indicates where fans ...
- Many Internet sites use more than one domain to host their content. You may have to add several domains to the Trusted sites ...
- Many Internet sites use more than one domain to host their content. You may have to add several domains to the Trusted sites ...
- Many of the application compatibility strategies in Windows XP depend on "matching information", which will help to identify ...
- Many organizations have offices located in different geographical locations, requiring remote site connectivity. You can ...
- Many organizations use a registration authority (RA) to manage certificate requests. Use the following certificate to sign ...
- Many other news readers cannot display HTML messages. If you are posting to a widely read newsgroup, it is recommended that ...
- Many Windows 9x applications were not programmed to respond to task switches caused by pressing Alt-Tab, the Windows key, ...
- Map cache file doesn't exist or corrupted. Corrective action taken: Regenerating the map cache file. Domain: %1, Map Name: ...
- Map drives %1.Choose how you want the contents of the drives on your old computer to get transferred to the drives on your ...
- Map is already defined. Current field definition - Key Field Number = '%1',Field Separator = '%2', New field definition - ...
- Map user accounts %1.Choose how you want the user accounts on your old computer to get transferred to user accounts on your ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped View Alignment Incorrect} An attempt was made to map a view of a file, but either the specified base address or the ...
- March 2001 Application Compatibility Package is incompatible with this version of Windows. All of its features are currently ...
- Marking an FT (fault tolerant) volume active will only mark underlying partitions active if they are primary partitions. ...
- MASK MASK is relevant only for hardware shadow copies after import. The shadow copy disk is removed from the machine and ...
- Master Stats: - Notifies Sent = %1!10lu! Requests = %2!10lu! NameError = %3!10lu! FormError = %4!10lu! Refused = %5!10lu! ...
- Matched Effective policy for query name %1: Key Name %2: DnsSecValidationRequired %3, DnsQueryOverIPSec %4, DnsEncryption ...
- Mature audience only. This program is specifically designed to be viewed by adults and therefore may be unsuitable for children ...
- Max number of concurrent Jet DB sessions. Every volume has its own DB and therefore this parameter is defined per-volume. ...
- maxBandwidth Maximum network bandwidth to which the Web site traffic is throttled. A value of -1 indicates that bandwidth ...
- MaxBurstLength is not serially greater than FirstBurstLength. Dump data contains FirstBurstLength followed by MaxBurstLength. ...
- maxConnections Maximum number of concurrent connections permitted by HTTP.sys. Connections that exceed this limit receive ...
- Maximum acceptable directory search response time (in milliseconds). This rule will issue a warning if the search response ...
- Maximum amount of time, in seconds, dirty lines or buckets may remain in the cache before they are flushed. A value of zero ...
- Maximum Anonymous Users is the maximum number of users who established concurrent anonymous connections using the FTP service ...
- Maximum Anonymous Users is the maximum number of users who established concurrent anonymous connections using the Web service ...
- Maximum application log size This security setting specifies the maximum size of the application event log, which has a theoretical ...
- Maximum CGI Requests is the maximum number of CGI requests simultaneously processed by the Web service (since service startup). ...
- Maximum command sequence number is not serially greater than expected command sequence number in login response. Dump data ...
- Maximum Connections is the maximum number of concurrent connections established with the Web service (since service startup). ...
- Maximum depth below top level has been reached, forcing object to be serialized as strings. Object type at max depth: %1 ...
- Maximum depth limit reached when traversing tree, nodes below this level will not be traversed. Possible bug in provider ...
- Maximum ISAPI Extension Requests is the maximum number of ISAPI requests simultaneously processed by the Web service (since ...
- Maximum length of a filename component supported by the Windows drive. A filename component is that portion of a filename ...
- Maximum lifetime for service ticket This security setting determines the maximum amount of time (in minutes) that a granted ...
- Maximum lifetime for user ticket renewal This security setting determines the period of time (in days) during which a user's ...
- Maximum lifetime for user ticket This security setting determines the maximum amount of time (in hours) that a user's ticket-granting ...
- Maximum NonAnonymous Users is the maximum number of concurrent non-anonymous connections to the Web service (since service ...
- Maximum NonAnonymous Users is the maximum number of users who established concurrent non-anonymous connections using the ...
- Maximum number of directly addressable entities supported by this Controller. A value of 0 should be used if the number is ...