Windows Server 2008
- What the notations mean: h = hour m = minute s = second tt = A.M. or P.M. h = 12 hour H = 24 hour hh, mm, ss = display leading ...
- What type of display is attached to your computer? If more than one display is connected to the computer select the display ...
- What you can try: If you want access to this website, you will need permission. Ask an administrator for permission. If you ...
- What you'll need: a USB flash drive (this requires a USB port on each computer) or an external hard disk that is compatible ...
- What you'll need: writable DVD or CD drives on both computers and enough discs to store all of the files that you want to ...
- When %s logs onto this computer, should the operating system use the roaming profile or just the locally cached copy of the ...
- When a block of memory is allotted for future updates, such as the memory allocated to hold discretionary access control ...
- When a quota or file screening event generates incident reports, default report settings are used. To modify the default ...
- When a trust exists between two forests, the authentication mechanisms for each forest trust the authentications that come ...
- When a user is connected through this Connection Manager profile, Connection Manager displays an icon in the notification ...
- When administrator accounts have no passwords, they can be used by anyone to bypass or turn off parental controls. If you ...
- When all the DCs are not SP1 or above and you enable this feature there is a possibility that any authenticated user on this ...
- When an add-on, such as a toolbar, is installed on your computer, it becomes part of your browser and operating system. In ...
- When an encoder is providing a stream for your broadcast, it can initiate the connection to your streaming media server (push) ...
- When an object identifier begins with either the number 0 or the number 1, the second number must be in the range of 0 to ...
- When asking for client authentication, this server sends a list of trusted certificate authorities to the client. The client ...
- When Chkdsk checks your disk drive for errors, it might save lost file fragments as files in your disk drive's root folder. ...
- When clearing volume flags that have been set using revert on close, the same combination of HIDDEN, READ ONLY, NO DRIVE ...
- When clients obtain an address, they are given DHCP options such as the IP addresses of routers (default gateways), DNS servers, ...
- When clients obtain an IP address from the DHCP server, they can be given DHCP options such as the IP addresses of DNS servers ...
- When clients obtain an IP address from the DHCP server, they can be given DHCP options such as the IP addresses of DNS servers ...
- When clients obtain an IP address from the DHCP server, they can be given DHCP options such as the IP addresses of WINS servers. ...
- When communicating with clients, AD FS uses the Secure Sockets Layer (SSL) protocol to encrypt network traffic. Choose a ...
- When communicating with clients, AD RMS uses the Secure Sockets Layer (SSL) protocol to encrypt network traffic. Choose a ...
- When communicating with clients, HRA and HCAP can use the Secure Sockets Layer (SSL) protocol to encrypt network traffic. ...
- When communicating with clients, TS Gateway uses the Secure Sockets Layer (SSL) protocol to encrypt network traffic. Choose ...
- When communicating with clients, WS-Atomic Transactions (WS-AT) uses the Secure Sockets Layer (SSL) protocol to encrypt network ...
- When Credential Roaming is disabled, the folders in which the user's credentials are stored are automatically removed from ...
- When Credential Roaming is enabled, the folders in which the user's credentials are stored are automatically added to the ...
- When file sharing is on, files and printers that you have shared from this computer can be accessed by people on the network. ...
- When forwarding events from local machine to itself, the query of the subscription can't contain target log of the subscription. ...
- When generating a cross realm referal from domain %1 the KDC was not able to find the suitable key to verify the ticket. ...
- When giving a presentation, your computer stays awake, system notifications are turned off, and the following settings are ...
- When going to a website with an address such as https://example.com, try adding the 'www' to the address, https://www.example.com. ...
- When Group Policy is selecting a domain controller, it will use the option chosen below. There is a policy that may override ...
- When I enter a password using Input Panel: - Require use of the on-screen keyboard - Do not show the cursor and which keys ...
- When I enter a password using Input Panel: - Show the on-screen keyboard - Do not show the cursor and which keys are tapped ...
- When installing from the CD autorun screen, you can have a HTML file opened by the browser in kiosk mode after system restart. ...
- When installing HP OpenView 3.0, do not install the included version of pcAnywhere. It installs a version of pcAnywhere that ...
- When installing this version of Visual Studio/InterDev, do not install Active Server Pages. If you install Active Server ...
- When instructed below, enter the passkey using your Bluetooth device. For more information about entering a passkey, see ...
- When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP address %1. Your computer may lose connectivity ...
- When Internet Connection Sharing is enabled, your network adapter will be set to use IP address 192.168.0.1. This might cause ...
- When Internet Explorer Enhanced Security Configuration is enabled on your server, the security settings for all Internet ...
- When Internet Explorer Enhanced Security Configuration is enabled, the security settings for all intranet sites are set to ...
- When Internet Explorer navigates to a page which requires an ActiveX control or Java code that is not already on the machine, ...
- When lookups are case sensitive, the case of returned filenames are always preserved. The CDFScase, FATcase and NTFScase ...
- When media sharing is on, people and devices on the network can access shared music, pictures, and videos on this computer, ...
- When network discovery is on, this computer can see other network computers and devices and is visible to other network computers. ...
- When network discovery is on, this computer can see other network computers and devices and is visible to other network computers. ...
- When password protection is on, only people who have a user account and password on this computer can access shared files, ...
- When playing WM Audio Professional content over an S/PDIF connection, some enhancements are not available, including visualizations, ...
- When policy is no longer applied, would you like to remove the group or the members added to the group? Choose 'Yes' to remove ...
- When policy was applied to this machine, the user's machine was in the Internet Explorer enhanced security configuration. ...
- When preparing a new volume shadow copy for volume %2, the shadow copy storage on volume %3 could not be located in non-critical ...
- When preparing a new volume shadow copy for volume %2, the shadow copy storage on volume %3 did not have sufficiently large ...
- When preparing a new volume shadow copy for volume %2, the shadow copy storage on volume %3 did not have sufficiently large ...
- When processing the topology for partition %1, a shortest-path with non-intersecting schedules was found. The path originated ...
- When Public folder sharing is on, people on the network can access files in the Public folder. What is the Public folder? ...
- When Public folder sharing is on, people on the network can access files in the Public folder. What is the Public folder? ...
- When requesting multiple copies, the first copy will print.The remaining copies will be held on the printer until you release ...
- When RSM attempted to eject the media in drive %1 of library %2, the drive reported that it contained no media. Most likely, ...
- When searching for a control, Internet Explorer will first try the location specified in the CODEBASE attribute of the HTML ...
- When several bus and/or connection data widths are possible, the NegotiatedDataWidth property defines the one in use between ...
- When several bus and/or connection speeds are possible, the NegotiatedSpeed property defines the one in use between the devices. ...
- When should I select the " I am using a private computer that complies with my organization's security policy" check box? ...
- When should I select the "I am using a private computer that complies with my organization's security policy" check box? ...
- When snapshot volume %1 was restarted in the system, the restart failed. The volume is no longer found in the system. Try ...
- When software (an ActiveX control) is signed, it is possible to tell who published it. Do you want to allow signed software ...
- When specifying the executable that you want to trace, you must specify a full path to the executable and not just a filename. ...
- When the black or color ink out light is on or flashing, the print head cannot be cleaned until the ink cartridge is replaced. ...
- When the federation server issues a token to a client, it digitally signs the token using a token-signing certificate. When ...
- When the installation has ended (successfully or not), please click the Finish button or the Cancel button. DO NOT CLICK ...
- When the media access device supports multiple individual media, this property defines the maximum number which can be supported ...
- When the user clicks Help in the browser menu bar, and then clicks Online support, the URL you specify below will be displayed ...