Windows Server 2008
- Wireless security started. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Peer ...
- Wireless security stopped. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Peer ...
- Wireless security succeeded. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Peer ...
- With a built-in firewall, Windows Defender, and built-in phishing filters for Windows Mail and Internet Explorer 7, Windows ...
- With a load-balanced terminal server farm, you can scale the performance of a single terminal server by distributing Terminal ...
- With a multicast stream, your streaming media server streams content to a multicast IP address on your multicast-enabled ...
- With Active Directory Domain Services (AD DS) installed, you cannot install Certification Authority until you make this server ...
- With alias (CNAME) resource records, you can use more than one name to point to a single computer. For example, you can use ...
- With File Server Resource Manager (FSRM) you can create quotas to limit the disk space allowed for a volume or folder and ...
- With File Server Resource Manager (FSRM) you can generate comprehensive storage reports to analyze the current status of ...
- With File Server Resource Manager (FSRM) you can set up file screens to block certain types of files from being saved on ...
- With Remote Assistance, you can invite someone you trust to connect to your computer and help you with a computer problem. ...
- With Server for NFS, a computer running a Microsoft Windows operating system can act as a Network File System (NFS) server. ...
- With Server for NFS, a Windows-based computer can act as a Network File System (NFS) server. Server for NFS enables a Windows-based ...
- With simplified tools for uploading, cropping, cutting, and creating photos, Windows Vista makes it easier and more enjoyable ...
- With Software Restriction Policies, you can define a default security level and rules (exceptions to that default security ...
- With the Cleaning Plate still in place, insert the second sheet of plain paper into the Auto Feeder to remove any remaining ...
- With this training, you can learn how to use your finger to open and close programs, to right-click, and more. You can also ...
- With TS Web Access, you can make individual programs that are installed on a terminal server available to users through a ...
- With User Name Mapping, you can create advanced group maps, which associate dissimilarly named Windows and UNIX groups. Advanced ...
- With User Name Mapping, you can create advanced user maps, which associate all dissimilarly named Windows and UNIX users. ...
- With User Name Mapping, you can create simple identity maps which automatically associate all identically named Windows and ...
- With Windows Media Center, you can watch and record TV on your computer. If both a standard TV signal and a Digital TV antenna ...
- With Windows Media Center, you can watch, pause, or record live TV so that you never miss a moment of your favorite show ...
- With Windows Media Center, your PC becomes the convenient hub for all your home entertainment needs, such as watching live ...
- With Windows Server Backup you can schedule backups to run once a day or more often, and you can choose to back up the entire ...
- With Windows Vista, you've got the hottest titles, the latest features, the most vivid 3-D graphics, and so many ways to ...
- With your current power plan, your computer hibernates after %s hours of sleep. While it's hibernating, Windows can't update ...
- Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
- Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
- Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
- Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
- Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
- Without a recovery password, you could permanently lose access to your protected files if BitLocker Drive Encryption encounters ...
- WLAN AutoConfig service failed to connect to a wireless network. Network Adapter: %2 Interface GUID: %1 Connection Mode: ...
- WLAN AutoConfig service has successfully connected to a wireless network. Network Adapter: %2 Interface GUID: %1 Connection ...
- WLAN AutoConfig service has successfully disconnected from a wireless network. Network Adapter: %2 Interface GUID: %1 Connection ...
- WLAN AutoConfig service started a connection to a wireless network. Network Adapter: %2 Interface GUID: %1 Connection Mode: ...
- WLBS_PORT_OVERLAP At least one of the port numbers in the specified port rule is currently listed in at least one other port ...
- WMI allows script-based management of numerous operating system components including disk drives, event logs, network adapter ...
- WMI caches provider registration objects to decrease overallexecution time. The substem will drop cache entries either through ...
- WMI filters can be linked to Group Policy objects (GPO). If a filter is linked to a GPO, then that GPO applies only to those ...
- WMI filters can be linked to Group Policy objects (GPO). If a filter is linked to a GPO, then that GPO applies only to those ...
- Wmi Instance Names for the device. This property is useful for mapping from the wmi namespace to the cimv2 namespace classes ...
- Word cannot save this document because the required encoding file, ieencode.dll, is missing. Please run Setup again, and ...
- Work Choose this for a workplace or similar location. Your computer is discoverable and you can see other computers and devices. ...
- Work offline anyway All applicable open files will be forced closed and the folder will work offline. This may result in ...
- Working Set - Private displays the size of the working set, in bytes, that is use for this process only and not shared nor ...
- Working Set - Shared displays the size of the working set, in bytes, that is sharable and may be used by other processes. ...
- Working Set is the current size, in bytes, of the Working Set of this process. The Working Set is the set of memory pages ...
- Working Set Peak is the maximum size, in bytes, of the Working Set of this process at any point in time. The Working Set ...
- Working Set Range Error} An attempt was made to set the working set minimum or maximum to values which are outside of the ...
- would parse each line in myfile.txt, ignoring lines that begin with a semicolon, passing the 2nd and 3rd token from each ...
- Would you also like to remove Address bar search functionality installed by other programs? If your Internet Explorer Address ...
- Would you like to create a single partition that stores DNS zone data and replicates that data to all DNS servers that are ...
- Would you like to create a single partition that stores DNS zone data and replicates that data to all DNS servers that are ...
- Would you like to import your original wallpaper into the Active Desktop? This will restore your wallpaper to the way it ...
- wpeutil options is required, and options are specific to each command. Commands: CreatePageFile /path= /size= Creates a page ...
- Write Bytes Cache/sec is the rate at which applications on your computer are writing to the file system cache by using the ...
- Write Bytes Network/sec is the rate at which applications are writing data across the network. This occurs when the file ...
- Write Bytes Non-Paging/sec is the rate at which bytes are written by the Redirector in response to normal file outputs by ...
- Write Bytes Paging/sec is the rate at which the Redirector is attempting to write bytes changed in the pages being used by ...
- Write Bytes/sec is the rate the server is writing data to files for the clients on this CPU. This value is a measure of how ...
- Write Copies/sec is the rate at which page faults are caused by attempts to write that have been satisfied by coping of the ...
- Write down your key, take it to your other computer, start Windows Easy Transfer, and then follow the instructions on the ...
- Write Free Media Label operation on Media %1 was cancelled. Media was left in the UNPREPARED state and must be prepared via ...
- Write Operations Random/sec is the rate at which, on a file-by-file basis, writes are made that are not sequential. If a ...
- Write Operations/sec is the rate the server is performing file write operations for the clients on this CPU. This value is ...
- Write Packets Small/sec is the rate at which writes are made by applications that are less than one-fourth of the server's ...
- Write Packets/sec is the rate at which writes are being sent to the network. Each time a single packet is sent with a request ...
- Write Protect Error} The disk cannot be written to because it is write protected. Please remove the write protection from ...
- Writer status is not available for one or more writers. A writer may have reached the limit to the number of available backup-restore ...
- WRITER { VERIFY | EXCLUDE } VERIFY Specify that the backup or restore operation must fail if the writer or component is not ...
- Writes Denied/sec is the rate at which the server is unable to accommodate requests for Raw Writes. When a write is much ...
- Writes Large/sec is the rate at which writes are made by applications that are over 2 times the server's negotiated buffer ...