Windows 8.1
- Many apps and services (like this one) rely on a Microsoft account to sync content and settings across devices. We'll help ...
- Many devices include sensors or have sensors installed nearby, in order to measure critical input and output properties. ...
- Many devices, such as processors or power supplies, require their own cooling devices. This association indicates where fans ...
- Many of the application compatibility strategies in Windows XP depend on "matching information", which will help to identify ...
- Many organizations use a registration authority (RA) to manage certificate requests. Use the following certificate to sign ...
- Many other news readers cannot display HTML messages. If you are posting to a widely read newsgroup, it is recommended that ...
- Many Windows 9x applications were not programmed to respond to task switches caused by pressing Alt-Tab, the Windows key, ...
- Map cache file doesn't exist or corrupted. Corrective action taken: Regenerating the map cache file. Domain: %1, Map Name: ...
- Map is already defined. Current field definition - Key Field Number = '%1',Field Separator = '%2', New field definition - ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped View Alignment Incorrect} An attempt was made to map a view of a file, but either the specified base address or the ...
- March 2001 Application Compatibility Package is incompatible with this version of Windows. All of its features are currently ...
- Marker error for known Win32 errors that are currently being ignored by the compositor. This is to avoid returning S_OK when ...
- Marking an FT (fault tolerant) volume active will only mark underlying partitions active if they are primary partitions. ...
- Marking cluster starting at VCN 5 with LCN 6 for 7 clusters in attribute %4 of type code 2 and instance tag 3 as in use by ...
- Marking cluster starting at VCN 5 with LCN 6 for 7 clusters in attribute %4 of type code 2 and instance tag 3 as not in use ...
- MASK MASK is relevant only for hardware shadow copies after import. The shadow copy disk is removed from the machine and ...
- Master Stats: - Notifies Sent = %1!10lu! Requests = %2!10lu! NameError = %3!10lu! FormError = %4!10lu! Refused = %5!10lu! ...
- Matched Effective policy for query name %1: Key Name %2: DnsSecValidationRequired %3, DnsQueryOverIPSec %4, DnsEncryption ...
- Matched effective policy for query name %1: Key Name %2: DnsSecValidationRequired %3, DnsQueryOverIPSec %4, DnsEncryption ...
- Mature audience only. This program is specifically designed to be viewed by adults and therefore may be unsuitable for children ...
- Max number of concurrent Jet DB sessions. Every volume has its own DB and therefore this parameter is defined per-volume. ...
- MaxBurstLength is not serially greater than FirstBurstLength. Dump data contains FirstBurstLength followed by MaxBurstLength. ...
- Maximum acceptable directory search response time (in milliseconds). This rule will issue a warning if the search response ...
- Maximum amount of time, in seconds, dirty lines or buckets may remain in the cache before they are flushed. A value of zero ...
- Maximum application log size This security setting specifies the maximum size of the application event log, which has a theoretical ...
- Maximum command sequence number is not serially greater than expected command sequence number in login response. Dump data ...
- Maximum depth below top level has been reached, forcing object to be serialized as strings. Object type at max depth: %1 ...
- Maximum depth limit reached when traversing tree, nodes below this level will not be traversed. Possible bug in provider ...
- Maximum length of a filename component supported by the Windows drive. A filename component is that portion of a filename ...
- Maximum lifetime for service ticket This security setting determines the maximum amount of time (in minutes) that a granted ...
- Maximum lifetime for user ticket renewal This security setting determines the period of time (in days) during which a user's ...
- Maximum lifetime for user ticket This security setting determines the maximum amount of time (in hours) that a user's ticket-granting ...
- Maximum number of directly addressable entities supported by this Controller. A value of 0 should be used if the number is ...
- Maximum number of incoming named pipe connections reached; new connections will be queued, and may time out or be rejected. ...
- Maximum number of kilobytes of memory that can be allocated to a process. For operating systems with no virtual memory, this ...
- Maximum number of minutes before the consumer will start a new instance. If zero, consumer lifetime is controlled by the ...
- Maximum number of process contexts the operating system can support. If there is no fixed maximum, the value should be 0. ...
- Maximum number of properties per document has been reached. The document is most likely corrupt, or it represents a denial ...
- Maximum number of scripts run before the consumer will start a new instance. The consumer should be shut down periodically ...
- Maximum password age This security setting determines the period of time (in days) that a password can be used before the ...
- Maximum run attempt limit for overall amoutn of machine boots reached. Lpremove won't run again. This is error situation ...
- Maximum security log size This security setting specifies the maximum size of the security event log, which has a theoretical ...
- Maximum Segment Descriptors Exceeded} The command specified a number of descriptors that exceeded the maximum supported by ...
- Maximum size to which file is allowed to grow. It will be archived when it exceeds this size. Archived files have an extension ...
- Maximum size, in Kbytes, of media supported by this device. KBytes is interpreted as the number of bytes multiplied by 1000 ...
- Maximum system log size This security setting specifies the maximum size of the system event log, which has a theoretical ...
- Maximum time in minutes allowed for a reboot to complete in an Updating Run. If it takes longer, it is considered a failed ...
- Maximum time in seconds that a group waits for its preferred node to come online during cluster startup before coming online ...
- Maximum tolerance for computer clock synchronization This security setting determines the maximum time difference (in minutes) ...
- MaxNumberOfPasswords specifies the number of passwords definable in the modem itself. If this feature is not supported, enter ...
- MaxRechargeTime indicates the maximum time, in minutes, to fully charge the battery. This property represents the time to ...
- May be one or more of the following: 0x00000001 - Fill. Fill files when pinning. 0x00000020 - PinForUser. Pin for the logged-on ...
- May be one or more of the following: 0x00000001 - FillSparse. Fill sparse files. 0x00000002 - SyncIn. Sync server changes ...
- May be one or more of the following: 0x00000001 - If the new owner already has a profile, calling this method with this flag ...
- May be one or more of the following: 0x00000001 - Indicate the profile is a temporary profile, it will be deleted at user ...
- May be one or more of the following: 0x00000001 - Interactive. OK to interact with user if necessary (i.e. alternate credential ...
- May be one or more of the following: 0x00000001 - NoAutoCached. Do not delete non-pinned files. 0x00000002 - NoPinned. Do ...
- May be one or more of the following: 0x00000020 - UnpinForUser. Unpin for the logged-on user. 0x00000040 - UnpinForUser_Policy. ...
- May be one or more of the following: 0x00000200 - LowPriority. Perform operation at low CPU and I/O priority whenever possible. ...
- MD-PC Link for Mebius V1.01 has a known compatibility issue with this version of Windows. For an update that is compatible ...
- MD5 and DES are considered to be insecure algorithms and their use is not recommended. Are you sure that you want to use ...
- MDL Read Hits is the percentage of Memory Descriptor List (MDL) Read requests to the file system cache that hit the cache, ...
- MDL Reads/sec is the frequency of reads from the file system cache that use a Memory Descriptor List (MDL) to access the ...
- Mebius Online User Touroku 5.0 has a known compatibility issue with this version of Windows. For an update that is compatible ...
- Mechanisms, such as HTTP cookies, for maintaining an active connection with an individual or for automatically identifying ...
- MechWarrior 3 has a known compatibility issue with this version of Windows. For an update that is compatible with this version ...
- Media Center Extender cannot find a license to play this content. To acquire a license, try playing this content directly ...