Windows 8.1

  1. In order for your phone book to be downloaded properly, the phone book name must be eight characters or less and it cannot ...
  2. In order to check the status of a certificate, a revocation configuration for the Online Responder must identify the CA that ...
  3. In order to check the status of a certificate, a revocation configuration for the Online Responder must identify the CA that ...
  4. In order to check the status of a certificate, a revocation configuration for the Online Responder must identify the CA that ...
  5. In order to complete the installation of 2], you must restart the computer. Other users are currently logged on to this computer, ...
  6. In order to deploy these packages to clients, you must add them to a driver group. A package can be in many driver groups, ...
  7. In order to dial correctly, your computer might require additional information, such as a calling-card number or the area ...
  8. In order to import the trusted publishing domain of "{0}", the drive's current location must be reset from {1} to {2}. Do ...
  9. In order to install Active Directory Domain Services, you must first make these ports available by removing or reconfiguring ...
  10. In order to perform this function, Windows Mail needs to Demand Install some files. Unfortunately your administrator has ...
  11. In order to refresh the drive {0}, it must reset its current location from {1} to drive root {2}. Do you want to continue? ...
  12. In order to remotely administer the cluster the remote registry service is required to be running. If cluster nodes are starting ...
  13. In order to remove the selected item {0}, the drive's current location must be reset from {1} to {2}. Are you sure you want ...
  14. In order to send encrypted mail to this person, you must add the digital ID to your contacts. Click the add button to create ...
  15. In order to set administrative callback mode, either you must specify a callback number or the user must already have a callback ...
  16. In order to share this printer, Windows Firewall must be configured to allow this printer to be shared with other computers ...
  17. In order to share this printer, Windows Firewall will be configured to allow this printer to be shared with other computers ...
  18. In order to transfer music to your Creative Nomad digital audio player, you must upgrade to version 2.50 or later. The update ...
  19. In order to use the SSLCertificateSHA1Hash WMI property, you mustfirst find the hexadecimal Thumbprint value for the certificatethat ...
  20. In particular, there is at least one node ({0}) that has only IPv4 addresses and at least one node ({1}) that has only IPv6 ...
  21. In redirected access mode, clustered roles that are using the Cluster Shared Volume do not have to be stopped while certain ...
  22. In response to local cultural norm, sensitivites and laws, your SafeSearch setting and access to adult content is locked ...
  23. In some editions of Windows, the disk might include file shadow copies and older Windows Complete PC Backup images as part ...
  24. In strict mode, function declarations cannot be nested inside a statement or block. They may only appear at the top level ...
  25. In Templates Management, you create and modify NPS templates. NPS templates allow you to create and save an NPS component ...
  26. in the AD RMS logging database has been decrypted successfully. Click Search Report in the Actions pane to locate specific ...
  27. In the case of an LDAP-derived instance, the ObjectClass property value(s) may be set to the objectClass attribute values. ...
  28. In the case of an LDAP-derived instance, the SeeAlso property specifies distinguished name of other Directory objects which ...
  29. In the case of an LDAP-derived instance, the UserPassword property may contain an encrypted password used to access the person's ...
  30. in the domain {2} trust(s) service principal name (SPN) {0} for delegation, but SPN {0} is not registered to an account. ...
  31. In the event of a cluster failover or move to another node, Hyper-V replication will pause if the new node does not also ...
  32. In the event of a failover (planned, unplanned, or test), the Replica virtual machine will come online using the same IP ...
  33. In the event of a failure on the domain's only domain controller, users will not be able to log in to the domain or access ...
  34. In the event of data loss or disk failure, you can reset the password that protects the AD RMS cluster key. If you used the ...
  35. In the event of data loss or disk failure, you can reset the password that protects the AD RMS cluster key. This policy setting ...
  36. In the event that you replace a hard disk drive or your computer fails to the point where it cannot be used or does not start ...
  37. In the guest operating system, do the following: Verify that appropriate drivers are installed and all networking devices ...
  38. In the input box, enter the expression or quoted strings that should be traced every time the tracepoint is encountered. ...
  39. In the input box, enter the expression to evaluate every time the breakpoint is encountered. If the expression evaluates ...
  40. In the list below, top values take precedence over lower values during classification. Lower values may be overridden by ...
  41. In the Password Replication Policy, you can specify whose passwords are allowed to replicate to the read-only domain controller ...
  42. In the past %1 hour(s) and %2 minute(s), %3 HTTP.SYS responses have had their application requested QoS conflict with URL ...
  43. In the resource mapping for class {0}, the node defines reference-to-collection cmdlets for property {1}, which is not a ...
  44. In the resource mapping of action '{0}' for class '{1}', the KeyParameterMap\Key section refers to a nonexistent key '{2}'. ...
  45. In the resource mapping of resource type '{0}' for action '{1}', the action parameter '{2}' mapped to a cmdlet parameter ...
  46. In the Start menu you can choose a computer activity, such as reading new e-mail messages or browsing the Web. This menu ...
  47. In the upper pane, select a virtual machine or specific files on a virtual machine, then drag and drop them into a folder ...
  48. In the value for parameter {0} double quotes were not used, but required. Double quotes are required for all values that ...
  49. In the Windows event log, look for event 12021 for more details about these applications. Consider issuing a new certificate ...
  50. In the Windows event log, look for events 12019 and 12020 for more details about these applications. This may occur due to ...
  51. In this phase, you will create a bootable USB flash drive that has the recovery software on it. The USB flash drive that ...
  52. In this topology, each member replicates with all other members of the replication group. This topology works well when there ...
  53. In this topology, the Remote Access server is deployed at the edge of the internal corporate network and is configured with ...
  54. In this topology, the Remote Access server is deployed behind an edge firewall or device, and is configured with two adapters. ...
  55. In this topology, the Remote Access server is deployed with a single network adapter that is connected to the internal network. ...
  56. In Windows 2003 and earlier versions of Windows, the Remote Procedure Call (RPC) Locator service manages the RPC name service ...
  57. In Windows 8 and prior versions of Windows, the help file opens when the Connection Manager Help button is clicked. In Windows ...
  58. In Windows 9x applications could restart the computer by calling the ExitWindowsEx API. Windows XP requires the application ...
  59. In Windows 9x, DirectDraw manipulates the palette directly without using GDI, while on NT it uses GDI. Therefore, if an application ...
  60. In Windows 9x, the DrawText API would accept out of range values and then convert them to acceptable values. This compatibility ...
  61. In Windows XP, applications are restricted from modifying the system menu. Instead, each application gets a separate copy ...
  62. In Windows XP, due to a modification in the caching between MoveFile and DeleteFile API's, when the VerInstallFileW API is ...
  63. In Windows XP, the WS_EX_CLIENTEDGE window style causes applications to run with the taskbar still visible. This may not ...
  64. In Windows XP, we have changed foreground semantics to stop foreground focus stealing by one app if another application is ...
  65. InactivityTimeout defines the time limit (in seconds) for automatic disconnection of the phone line, if no data is exchanged. ...
  66. Inbound allow rule to allow traffic to the network location server deployed on the Remote Access server (with a single network ...
  67. Inbound Allowed Default Block Exempt Packets is the total number of default block exempt packets forwarded from a public ...
  68. Inbound Allowed Default Block Exempt Packets per Second is the rate at which default block exempt packets are forwarded from ...
  69. Inbound Allowed Filter Exempt IPv6 Packets is the total number of IPv6 filter exempt packets forwarded from a public interface ...
  70. Inbound Allowed Filter Exempt IPv6 Packets per Second is the rate at which IPv6 filter exempt packets are forwarded from ...
  71. Inbound Allowed ICMPv6 Packets is the total number of ICMPv6 packets forwarded from a public interface to an internal interface. ...
  72. Inbound Allowed ICMPv6 Packets per Second is the rate at which ICMPv6 packets are forwarded from a public interface to an ...
  73. Inbound Allowed IPv6 IPsec Authenticated Packets is the total number of authenticated IKEv1, IKEv2, AuthIP, or ESP IPv6 packets ...
  74. Inbound Allowed IPv6 IPsec Authenticated Packets per Second is the rate at which authenticated IKEv1, IKEv2, AuthIP or ESP ...
  75. Inbound Allowed IPv6 IPsec Unauthenticated Packets is the total number of unauthenticated IKEv1, IKEv2, AuthIP, or ESP IPv6 ...