Windows 8.1

  1. Many apps and services (like this one) rely on a Microsoft account to sync content and settings across devices. We'll help ...
  2. Many devices include sensors or have sensors installed nearby, in order to measure critical input and output properties. ...
  3. Many devices, such as processors or power supplies, require their own cooling devices. This association indicates where fans ...
  4. Many of the application compatibility strategies in Windows XP depend on "matching information", which will help to identify ...
  5. Many organizations use a registration authority (RA) to manage certificate requests. Use the following certificate to sign ...
  6. Many other news readers cannot display HTML messages. If you are posting to a widely read newsgroup, it is recommended that ...
  7. Many Windows 9x applications were not programmed to respond to task switches caused by pressing Alt-Tab, the Windows key, ...
  8. Map cache file doesn't exist or corrupted. Corrective action taken: Regenerating the map cache file. Domain: %1, Map Name: ...
  9. Map is already defined. Current field definition - Key Field Number = '%1',Field Separator = '%2', New field definition - ...
  10. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  11. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  12. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  13. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  14. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  15. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  16. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  17. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  18. Mapped View Alignment Incorrect} An attempt was made to map a view of a file, but either the specified base address or the ...
  19. March 2001 Application Compatibility Package is incompatible with this version of Windows. All of its features are currently ...
  20. Marker error for known Win32 errors that are currently being ignored by the compositor. This is to avoid returning S_OK when ...
  21. Marking an FT (fault tolerant) volume active will only mark underlying partitions active if they are primary partitions. ...
  22. Marking cluster starting at VCN 5 with LCN 6 for 7 clusters in attribute %4 of type code 2 and instance tag 3 as in use by ...
  23. Marking cluster starting at VCN 5 with LCN 6 for 7 clusters in attribute %4 of type code 2 and instance tag 3 as not in use ...
  24. MASK MASK is relevant only for hardware shadow copies after import. The shadow copy disk is removed from the machine and ...
  25. Master Stats: - Notifies Sent = %1!10lu! Requests = %2!10lu! NameError = %3!10lu! FormError = %4!10lu! Refused = %5!10lu! ...
  26. Matched Effective policy for query name %1: Key Name %2: DnsSecValidationRequired %3, DnsQueryOverIPSec %4, DnsEncryption ...
  27. Matched effective policy for query name %1: Key Name %2: DnsSecValidationRequired %3, DnsQueryOverIPSec %4, DnsEncryption ...
  28. Mature audience only. This program is specifically designed to be viewed by adults and therefore may be unsuitable for children ...
  29. Max number of concurrent Jet DB sessions. Every volume has its own DB and therefore this parameter is defined per-volume. ...
  30. MaxBurstLength is not serially greater than FirstBurstLength. Dump data contains FirstBurstLength followed by MaxBurstLength. ...
  31. Maximum acceptable directory search response time (in milliseconds). This rule will issue a warning if the search response ...
  32. Maximum amount of time, in seconds, dirty lines or buckets may remain in the cache before they are flushed. A value of zero ...
  33. Maximum application log size This security setting specifies the maximum size of the application event log, which has a theoretical ...
  34. Maximum command sequence number is not serially greater than expected command sequence number in login response. Dump data ...
  35. Maximum depth below top level has been reached, forcing object to be serialized as strings. Object type at max depth: %1 ...
  36. Maximum depth limit reached when traversing tree, nodes below this level will not be traversed. Possible bug in provider ...
  37. Maximum length of a filename component supported by the Windows drive. A filename component is that portion of a filename ...
  38. Maximum lifetime for service ticket This security setting determines the maximum amount of time (in minutes) that a granted ...
  39. Maximum lifetime for user ticket renewal This security setting determines the period of time (in days) during which a user's ...
  40. Maximum lifetime for user ticket This security setting determines the maximum amount of time (in hours) that a user's ticket-granting ...
  41. Maximum number of directly addressable entities supported by this Controller. A value of 0 should be used if the number is ...
  42. Maximum number of incoming named pipe connections reached; new connections will be queued, and may time out or be rejected. ...
  43. Maximum number of kilobytes of memory that can be allocated to a process. For operating systems with no virtual memory, this ...
  44. Maximum number of minutes before the consumer will start a new instance. If zero, consumer lifetime is controlled by the ...
  45. Maximum number of process contexts the operating system can support. If there is no fixed maximum, the value should be 0. ...
  46. Maximum number of properties per document has been reached. The document is most likely corrupt, or it represents a denial ...
  47. Maximum number of scripts run before the consumer will start a new instance. The consumer should be shut down periodically ...
  48. Maximum password age This security setting determines the period of time (in days) that a password can be used before the ...
  49. Maximum run attempt limit for overall amoutn of machine boots reached. Lpremove won't run again. This is error situation ...
  50. Maximum security log size This security setting specifies the maximum size of the security event log, which has a theoretical ...
  51. Maximum Segment Descriptors Exceeded} The command specified a number of descriptors that exceeded the maximum supported by ...
  52. Maximum size to which file is allowed to grow. It will be archived when it exceeds this size. Archived files have an extension ...
  53. Maximum size, in Kbytes, of media supported by this device. KBytes is interpreted as the number of bytes multiplied by 1000 ...
  54. Maximum system log size This security setting specifies the maximum size of the system event log, which has a theoretical ...
  55. Maximum time in minutes allowed for a reboot to complete in an Updating Run. If it takes longer, it is considered a failed ...
  56. Maximum time in seconds that a group waits for its preferred node to come online during cluster startup before coming online ...
  57. Maximum tolerance for computer clock synchronization This security setting determines the maximum time difference (in minutes) ...
  58. MaxNumberOfPasswords specifies the number of passwords definable in the modem itself. If this feature is not supported, enter ...
  59. MaxRechargeTime indicates the maximum time, in minutes, to fully charge the battery. This property represents the time to ...
  60. May be one or more of the following: 0x00000001 - Fill. Fill files when pinning. 0x00000020 - PinForUser. Pin for the logged-on ...
  61. May be one or more of the following: 0x00000001 - FillSparse. Fill sparse files. 0x00000002 - SyncIn. Sync server changes ...
  62. May be one or more of the following: 0x00000001 - If the new owner already has a profile, calling this method with this flag ...
  63. May be one or more of the following: 0x00000001 - Indicate the profile is a temporary profile, it will be deleted at user ...
  64. May be one or more of the following: 0x00000001 - Interactive. OK to interact with user if necessary (i.e. alternate credential ...
  65. May be one or more of the following: 0x00000001 - NoAutoCached. Do not delete non-pinned files. 0x00000002 - NoPinned. Do ...
  66. May be one or more of the following: 0x00000020 - UnpinForUser. Unpin for the logged-on user. 0x00000040 - UnpinForUser_Policy. ...
  67. May be one or more of the following: 0x00000200 - LowPriority. Perform operation at low CPU and I/O priority whenever possible. ...
  68. MD-PC Link for Mebius V1.01 has a known compatibility issue with this version of Windows. For an update that is compatible ...
  69. MD5 and DES are considered to be insecure algorithms and their use is not recommended. Are you sure that you want to use ...
  70. MDL Read Hits is the percentage of Memory Descriptor List (MDL) Read requests to the file system cache that hit the cache, ...
  71. MDL Reads/sec is the frequency of reads from the file system cache that use a Memory Descriptor List (MDL) to access the ...
  72. Mebius Online User Touroku 5.0 has a known compatibility issue with this version of Windows. For an update that is compatible ...
  73. Mechanisms, such as HTTP cookies, for maintaining an active connection with an individual or for automatically identifying ...
  74. MechWarrior 3 has a known compatibility issue with this version of Windows. For an update that is compatible with this version ...
  75. Media Center Extender cannot find a license to play this content. To acquire a license, try playing this content directly ...