Windows 7

  1. MMC cannot create this view because it contains a Web browser control. Be sure Internet Explorer 5.0 or greater is installed. ...
  2. MMC cannot initialize because the MMC installation or a portion of the registry is corrupted. You can attempt to fix the ...
  3. MMC cannot initialize because the MMC installation or a portion of the registry is corrupted. You can attempt to fix the ...
  4. MMC cannot initialize the snap-in because the snap-in requires version %1!s! of the .Net Framework and version %2!s! is already ...
  5. MMC cannot open the file %1. This may be because the file does not exist, is not an MMC console, or was created by a later ...
  6. MMC could not enumerate existing services from the Service Control Manager. The service dependencies configuration list will ...
  7. Moderated user-generated content in any context. Unmoderated user-generated content only in artistic, medical, educational, ...
  8. mode`mode`trace_mode`Event Trace Session logger mode. For more information visit - http://go.microsoft.com/fwlink/?LinkID=136464 ...
  9. Modfies the ntdssettings object of the domain controller targeted by the "[DC]"parameter . Capabilities include Add or remove ...
  10. Modification Made Assigning Object Type: %1 Assigning Object Name: %2 Assigning Object GUID: %3 Logon ID: %4 Assigned Member ...
  11. Modification Made Assigning Object Type: %1 Assigning Object Name: %2 Assigning Object GUID: %3 Logon ID: %4 Referenced Object ...
  12. Modification Made Creating Object Type: %1 Creating Object Name: %2 Creating Object GUID: %3 Logon ID: %4 New Object Type: ...
  13. Modification Made Database Name: %1 SQL Role: %2 Object ID: %3 Object Type: %4 Logon ID: %5 Member Name: %6 Modification ...
  14. Modification Made Deleting Object Type: %1 Deleting Object Name: %2 Deleting Object GUID: %3 Logon ID: %4 Deleted Object ...
  15. Modification Made Removing Object Type: %1 Removing Object Name: %2 Removing Object GUID: %3 Logon ID: %4 Removed Member ...
  16. Modification Made Removing Object Type: %1 Removing Object Name: %2 Removing Object GUID: %3 Logon ID: %4 Unreferenced Object ...
  17. Modifications or transforms allow you to customize the package and are applied to the package in the order shown in the following ...
  18. Modified Page List Bytes is the amount of physical memory, in bytes, that is assigned to the modified page list. This memory ...
  19. Modifies or displays the replication authentication mode in use by an ADAM configuration set. SYNTAX /replauthmode DSA_LIST ...
  20. Modifies the specified 24-hour schedule. 1. wsrmc /Modify:Sched /i: /Force must be a valid XML file. /Force overrides time-stamp ...
  21. Modifies the specified Policy. 1. wsrmc /Modify:Pol /i: /Force must be a valid XML file. /Force overrides time-stamp checking. ...
  22. Modify an object label This privilege determines which user accounts can modify the integrity label of objects, such as files, ...
  23. Modify auto apply quotas. The syntax of this command is: Dirquota Autoquota Modify /Path:PATH /SourceTemplate:TEMPLATE /Apply:{None|All|Matching} ...
  24. Modify existing file groups. The syntax of this command is: Filescrn Filegroup Modify /Filegroup:FG_NAME /New-Filegroup:FG_NAME_NEW ...
  25. Modify existing file screen exceptions. The syntax of this command is: Filescrn Exception Modify /Path:PATH /Add-Filegroup:ADD_FG ...
  26. Modify existing file screen templates. The syntax of this command is: Filescrn Template Modify /Template:TEMPLATE_NAME /New-Template:TEMPLATE_NEW ...
  27. Modify existing file screens. The syntax of this command is: Filescrn Screen Modify /Path:PATH /SourceTemplate:TEMPLATE /Type:{Active|Passive} ...
  28. Modify existing quota templates. The syntax of this command is: Dirquota Template Modify /Template:TEMPLATE_NAME /New-Template:TEMPLATE_NEW ...
  29. Modify existing quotas. The syntax of this command is: Dirquota Quota Modify /Path:PATH /Limit:LIMIT[kb|mb|gb /Type:{Hard|Soft} ...
  30. Modify existing storage report jobs. The syntax of this command is: Storrept Reports Modify /Task:TASK /New-Task:NEW_TASK ...
  31. Modify firmware environment values This security setting determines who can modify firmware environment values. Firmware ...
  32. Modify the configuration of a log. Usage: wevtutil { sl | set-log } /OPTION:VALUE /OPTION:VALUE . String that uniquely identifies ...
  33. Modify the specified Calendar Event. 1. wsrmc /Modify:Cal /i: /Force must be a valid XML file. /Force overrides time-stamp ...
  34. Modify the specified Process Matching Criteria. 1. wsrmc /Modify:Pmc /i: /Force must be a valid XML file. /Force overrides ...
  35. Modify the wireless network security settings for "%ws" If you set up or own this network, you might be able to fix the problem ...
  36. Modify the wireless router or access point settings for "%ws" The settings on the wireless router or access point are incompatible ...
  37. Modify the wireless router or access point settings for "%ws" The wireless network adapter on this computer does not support ...
  38. Modify the wireless security settings for "%ws" The wireless network you are trying to connect to requires shared-key authentication, ...
  39. Modifying resource dependencies for DFS Replicated folder resources is not recommended. Instead, please use the DFS Management ...
  40. Module definition '%s' in classification rule '%s' was either disabled or not found. The classification rule will not be ...
  41. ModuleInstance represents the Win32 instance handle.The ModuleInstance property has been deprecated. There is no replacement ...
  42. Monitor the performance of the RD Gateway server to determine the maximum number of connections that the RD Gateway server ...
  43. Monitor's refresh rate in hertz. If a range of rates is supported, use the MinRefreshRate and MaxRefreshRate properties, ...
  44. Monitors ambient light sensors to detect changes in ambient light and adjust the display brightness. If this service is stopped ...
  45. Monitors the state of this virtual machine by reporting a heartbeat at regular intervals. This service helps you identify ...
  46. More cake orders have come in. Can you help us out? Watch the TV and make cakes that match the ones on the screen. Good luck! ...
  47. More channels were found but were not added to the TV Program Guide because they did not have enough information. You can ...
  48. More records remain to be enumerated! To enumerate ALL reissue the command with the \/Continue\ option. OR To enumerate remaining ...
  49. More than one adapter has been enabled on at least one of the servers currently logged on to the selected target. If the ...
  50. More than one computer matched the name entered. Select a computer name from the list, or click Cancel and enter the name ...
  51. More than one device is performing network address translation (NAT) Multiple NAT devices can cause connectivity problems ...
  52. More than one I/O path has been enabled to access the LUN. If the server or cluster is not configured to use Multipath I/O, ...
  53. More than one object matches the following object name: "%1". Select an object from this list or, to reenter the name, click ...
  54. More than one port has been enabled to access the LUN. If the server or cluster is not configured to use Multipath I/O, data ...
  55. More than the maximum number of default gateways were specified for network adapter %2. Some remote networks may not be reachable ...
  56. More than the maximum number of files per group matched the report criteria. Only the top {0} files are shown in the following ...
  57. More than {1} programs were found with the keyword {0}. There may not be enough disk space to record all of these programs ...
  58. Most DVDs are encoded for play in specific regions. To play a regionalized DVD on your computer, you must set your DVD drive ...
  59. Most FTP servers allow users to log on anonymously with limited access to the server. Do you want to log on anonymously? ...
  60. Most organizations deploy an offline root certification authority (CA) and one or more subordinate CAs as a public key infrastructure ...
  61. Mouse Keys lets you control the mouse pointer by using the numeric keypad on your keyboard. The keyboard shortcut to turn ...
  62. Move all the cards to the home cells using the free cells as placeholders. Stack the cards by suit and rank from lowest (ace) ...
  63. Move the certificate database and log files to a non-system drive, and update the CA configuration to indicate the new location. ...
  64. Move the mobile broadband device to an area with network coverage There might not be mobile broadband network coverage in ...
  65. Move the mobile broadband device to an area with network coverage, and then try again Mobile broadband data service is not ...
  66. Move the mobile broadband device to an area with network coverage, and then try again Mobile broadband data service is not ...
  67. Move the slider control below to adjust the settings for the Junk Mail detectors. Catch Less means that some Junk Mail may ...
  68. Move these files out of the folder, rename them without using these characters, then move them back into the folder and try ...
  69. Move this device to a controller that has more available bandwidth or, to free bandwidth, close the programs using the devices ...
  70. Moves files and renames files and directories. To move one or more files: MOVE /Y | /-Y drive:][path]filename1[,. destination ...
  71. Moves one or more disks from an online pack to a new offline pack. Syntax: SPLIT DISK= , ,. DISK= , ,. Specifies the disk ...
  72. Moving '{0}' to Available Storage could cause clustered resources that are currently using this storage to fail or experience ...
  73. Moving items from an FTP server to the Recycle Bin will cause them to be deleted permanently. Are you sure you want to continue? ...
  74. Moving objects in Active Directory Domain Services can prevent your existing system from working the way it was designed. ...
  75. Moving {0} to another cluster node will disconnect any currently connected clients. Are you sure you want to continue moving ...