Windows 8.1

  1. Security policies on this computer are set to show info about the last interactive sign-in, but Windows couldn't retrieve ...
  2. Security settings could not be applied to the folder %1. To prevent unauthorized access to the folder, you should manually ...
  3. Security settings could not be applied to the shared folder %1. To prevent unauthorized access to the folder, you should ...
  4. Security Stats: - Security Context: Create = %1!10lu! Free = %2!10lu! Timeout = %3!10lu! Queue Length = %4!10lu! Queued = ...
  5. Security updates have been installed and require this computer to be restarted. Please close all applications and restart ...
  6. Security Zones and Content Ratings allow you to control what information the users can view and what is downloaded to their ...
  7. SecurityBreach is an enumerated, integer-valued property indicating whether a physical breach of the frame was attempted ...
  8. See additional information about disk space under the informational section in the "Amount of disk space used by replicated ...
  9. See also: dsadd computer /? - help for adding a computer to the directory. dsadd contact /? - help for adding a contact to ...
  10. See also: dsadd computer /? - help for adding a computer to the directory. dsadd contact /? - help for adding a contact to ...
  11. See also: dsget - describes parameters that apply to all commands. dsget computer - displays properties of computers in the ...
  12. See also: dsget - describes parameters that apply to all commands. dsget computer - displays properties of computers in the ...
  13. See also: dsget - describes parameters that apply to all commands. dsget computer - displays properties of computers in the ...
  14. See also: dsget - describes parameters that apply to all commands. dsget computer - displays properties of computers in the ...
  15. See also: dsget - describes parameters that apply to all commands. dsget computer - displays properties of computers in the ...
  16. See also: dsmod computer /? - help for modifying an existing computer in the directory. dsmod contact /? - help for modifying ...
  17. See also: dsmod computer /? - help for modifying an existing computer in the directory. dsmod contact /? - help for modifying ...
  18. See also: dsquery computer /? - help for finding computers in the directory. dsquery contact /? - help for finding contacts ...
  19. See also: dsquery computer /? - help for finding computers in the directory. dsquery contact /? - help for finding contacts ...
  20. See if we have secure channels from all of the DC's in the domain the domains specified by /testdomain:. /nositerestriction ...
  21. Segment Load} A virtual DOS machine (VDM) is loading, unloading, or moving an MS-DOS or Win16 program segment image. An exception ...
  22. Segments Received/sec is the rate at which segments are received, including those received in error. This count includes ...
  23. Segments Retransmitted/sec is the rate at which segments are retransmitted, that is, segments transmitted containing one ...
  24. Segments Sent/sec is the rate at which segments are sent, including those on current connections, but excluding those containing ...
  25. Select a certificate template used to enroll the certificate used by the Remote Access server to sign OTP certificate enrollment ...
  26. Select a computer naming format for new client computers, and set the location in the directory service where client computer ...
  27. Select a contact from the contact list below. Your contact will be able to connect to you securely without using a password. ...
  28. Select a cover page template, and type a subject line and note if required by the template. This information is automatically ...
  29. Select a domain name service provider. A domain name service provider can help you select a domain name that fits your needs. ...
  30. Select a game controller from the list below, and then click OK. If your game controller does not appear in the list, click ...
  31. Select a hard disk drive with enough free space to temporarily store files you're burning to a disc. The drive might need ...
  32. Select a key from the list. The listed keys are the keys available on the target computer matching the search criteria. You ...
  33. Select a language below to get started. Only languages that are currently installed and can be personalized are listed. What ...
  34. Select a line on your ISDN adapter, and type its multiple subscriber numbers, as provided by your phone company. After entering ...
  35. Select a line on your ISDN adapter. Then, select each channel, and type its phone number and SPID, as provided by your phone ...
  36. Select a line on your ISDN adapter. Then, select each channel, and type its phone number, as provided by your phone company. ...
  37. Select a line on your ISDN adapter. Then, select each logical terminal, and type its subaddress and phone number Repeat for ...
  38. Select a particular font or piece of stationery to be used every time you start a new e-mail message. Click the Tools menu, ...
  39. Select a quorum witness option to add or change the quorum witness for your cluster configuration. As a best practice, configure ...
  40. Select a reference member that has the most up-to-date files. Files on this member will be used to compare files on other ...
  41. Select a server on which to mount the virtual hard disk (VHD). If you select a VHD file from a network share, that share ...
  42. Select a server to use as a baseline for this security policy. You can apply this policy to the selected server or to any ...
  43. Select a service provider. If you do not have a membership with the provider you select, the wizard will help you create ...
  44. Select a service provider. If you do not have a membership with the provider you select, the wizard will help you create ...
  45. Select a Starter GPO cabinet (CAB) file to load into this domain's Starter GPO store. Check the version comparison table ...
  46. Select a VPN server from the list below. You might choose a server closest to your current location, or a server closest ...
  47. Select Add Channel to enter the name and channel number for a standard TV channel that is missing from the Guide. To add ...
  48. Select an Active Directory Domain Controller from the list below by either name or site. (You can refresh the list by either ...
  49. Select an existing file encryption certificate or create a new one. If you have already encrypted files, you can update them ...
  50. Select an item below to configure NPS as a RADIUS server, Network Access Protection (NAP) policy server, or RADIUS proxy. ...
  51. Select an item below to create, configure, and manage templates. All templates can be exported to or imported from other ...
  52. Select an offline VHD file on which Windows Server 2012 is already installed, and from which you want to remove roles and ...
  53. Select an offline VHD file on which Windows Server 2012 is already installed, and on which you want to install roles and ...
  54. Select at least one supported Windows authentication method. If you select both methods, users that use either method will ...
  55. Select certain built-in and custom fields and group them, in order to create meaningful view of logical grouping based on ...
  56. Select certain built-in and custom fields and group them, in order to create meaningful view of logical grouping based on ...
  57. Select certain built-in and custom fields and group them, in order to create meaningful view of logical grouping based on ...
  58. Select Configure Accounting if you want to run the Accounting Configuration Wizard. The wizard allows you to choose between ...
  59. Select EAP types to use with PEAP. The authentication type determines the kind of credentials that NPS can accept from client ...
  60. Select Enable to automatically synchronize passwords in the Windows to UNIX direction for all NIS accounts that have been ...
  61. Select how data for this virtual disk will be stored on the selected physical disks. These values customize the performance ...
  62. Select how long Server for NFS will wait for clients to reclaims locks when Server for NFS recovers from a disruption in ...
  63. Select how long you would like to keep your download history. You can also purge your download history by clicking Clear ...
  64. Select how to resolve the following error codes that may be returned for this system health validator and its associated ...
  65. Select one of the following options, depending on whether you want to replicate domain data over the network from an existing ...
  66. Select one of these options to determine which action Windows Firewall with Advanced Security will take for the incoming ...
  67. Select one or more networks for virtual machines to use for live migration. Use the buttons to list them in order from most ...
  68. Select one or more sync conflicts. Then click Resolve to view the details of each conflict and decide how to resolve them. ...
  69. Select one or more volumes to store your backups. Use multiple volumes in different disks if you want to store backups offsite. ...
  70. Select one preferred network Windows Help and Support can provide more information about how to prevent your computer from ...
  71. Select one preferred network Windows Help and Support can provide more information about how to prevent your computer from ...
  72. Select only one file to rename, or use MS-DOS wildcards (for example, *.txt) to rename a group of files with similar names. ...
  73. Select only the storage volumes that you want to assign to this clustered role. You can assign additional storage to this ...
  74. Select options below to enable and change or disable types of global filters that will be applied to the Administrative Templates ...
  75. Select or type a name to represent this folder on all members of the replication group. This name is known as the replicated ...