Windows 8.1

  1. After you stop using Work Folders, you can delete the folder used by Work Folders on this PC. Files on your other devices ...
  2. After you subscribe to {0}, you can manage users' licenses from the dashboard. Click Cancel if you don't want to subscribe ...
  3. Age over 1. This program contains some material that many parents would find unsuitable for children under 1 year of age. ...
  4. Age over 10. This program contains some material that many parents would find unsuitable for children under 10 years of age. ...
  5. Age over 11. This program contains some material that many parents would find unsuitable for children under 11 years of age. ...
  6. Age over 12. This program contains some material that many parents would find unsuitable for children under 12 years of age. ...
  7. Age over 13. This program contains some material that many parents would find unsuitable for children under 13 years of age. ...
  8. Age over 14. This program contains some material that many parents would find unsuitable for children under 14 years of age. ...
  9. Age over 15. This program contains some material that many parents would find unsuitable for children under 15 years of age. ...
  10. Age over 16. This program contains some material that many parents would find unsuitable for children under 16 years of age. ...
  11. Age over 17. This program contains some material that many parents would find unsuitable for children under 17 years of age. ...
  12. Age over 18. This program contains some material that many parents would find unsuitable for children under 18 years of age. ...
  13. Age over 19. This program contains some material that many parents would find unsuitable for children under 19 years of age. ...
  14. Age over 2. This program contains some material that many parents would find unsuitable for children under 2 years of age. ...
  15. Age over 20. This program contains some material that many parents would find unsuitable for children under 20 years of age. ...
  16. Age over 21. This program contains some material that many parents would find unsuitable for children under 21 years of age. ...
  17. Age over 3. This program contains some material that many parents would find unsuitable for children under 3 years of age. ...
  18. Age over 4. This program contains some material that many parents would find unsuitable for children under 4 years of age. ...
  19. Age over 5. This program contains some material that many parents would find unsuitable for children under 5 years of age. ...
  20. Age over 6. This program contains some material that many parents would find unsuitable for children under 6 years of age. ...
  21. Age over 7. This program contains some material that many parents would find unsuitable for children under 7 years of age. ...
  22. Age over 8. This program contains some material that many parents would find unsuitable for children under 8 years of age. ...
  23. Age over 9. This program contains some material that many parents would find unsuitable for children under 9 years of age. ...
  24. Aggregates and uploads Application Telemetry information if opted-in to the Microsoft Customer Experience Improvement Program. ...
  25. AIWA TA Utility has a known compatibility issue with this version of Windows and might not run as expected. When you use ...
  26. Alert notifications are not available for Health Monitoring due to an error or an incomplete action, or a service has stopped ...
  27. Alert: Please be aware that your AD RMS super user {0} is enabled. It is okay to have your super user enabled if you are ...
  28. Alerts failed because of network failures or because the internal cache size was exceeded. If the problem persists, change ...
  29. Alerts for a content source with a local address are only supported for a fixed media drive type. Use the UNC name for remote ...
  30. Algorithm: %1 Key length: %2!d! bits KSP: %3 DNSKEY signature validity: %4!d! hours DS Signature validity: %5!d! hours Zone ...
  31. Algorithm: %1 Key length: %2!d! bits KSP: %3 DNSKEY signature validity: %4!d! hours DS signature validity: %5!d! hours Zone ...
  32. Algorithm: %1 Key length: %2!d! bits KSP: %3 DNSKEY signature validity: %4!d! hours DS Signature validity: %5!d! hours Zone ...
  33. Algorithm: %1 Key length: %2!d! bits KSP: %3 DNSKEY signature validity: %4!d! hours DS signature validity: %5!d! hours Zone ...
  34. Algorithm: %1 Key length: %2!d! bits KSP: %3 DNSKEY signature validity: %4!d! hours Replication: %5 Rollover state: %6 Active ...
  35. Algorithm: %1 Key length: %2!d! bits KSP: %3 DNSKEY signature validity: %4!d! hours Replication: %5 Rollover state: %6 Rollover ...
  36. Algorithm: %1 Key length: %2!d! bits KSP: %3 DNSKEY signature validity: %4!d! hours Replication: %5 Rollover state: %6 Rollover ...
  37. Alias (CNAME) Alias record. Indicates an alternate or alias DNS domain name for a name already specified in other resource ...
  38. Align text to both left and right margins, adding extra space between words as necessary. This creates a clean look along ...
  39. Aligning the nodes and sockets of a virtual machine to the hardware topology helps improve the performance of NUMA-aware ...
  40. All application directory partitions on this Active Directory domain controller will be removed. This domain controller holds ...
  41. All application directory partitions on this Active Directory domain controller will be removed. This domain controller holds ...
  42. All approved applications must have a path. For each application in the list marked with "[No path!]", either edit the item ...
  43. All authenticated incoming servers would be allowed to replicate. All existing authorization entries will be removed. Do ...
  44. All authentication sets have been deleted from the IPsec configuration on this computer. IPsec Phase: %1 Store Type: %2 ModifyingUser: ...
  45. All available "%1!s!" licenses for product "%2!s!" on Remote Desktop license server "%3!s!" have been removed. Use RD Licensing ...
  46. All available disks are dynamic disks and cannot be used to back up system volumes. Attach a basic disk to use for backups. ...
  47. All available storage in the new cluster has already been assigned to other clustered roles. Storage can only be shared between ...
  48. All bits of IP address "{0}" are set to 0, it can not be used for the domain controller virtual machine. Use a valid IP address. ...
  49. All bits of IP address "{0}" are set to 1, it can not be used for the domain controller virtual machine. Use a valid IP address. ...
  50. All CA servers are in one of the following states: 1. CA server cannot be reached. 2. CA server is busy with previous requests. ...
  51. All certificate authentication methods using the same certificate signing algorithm must be grouped together in each list. ...
  52. All certificate authentications using the same signing algorithm must have the same require health setting. You cannot specify ...
  53. All changes must be performed on the virtual desktop template before you recreate the virtual desktops in this collection. ...
  54. All connection security rules have been deleted from the IPsec configuration on this computer. Store Type: %1 ModifyingUser: ...
  55. All connections to the Global Catalog servers are unresponsive or there are fewer connections than are required to run the ...
  56. All connections to the new member will use a custom connection schedule. To set up a custom connection schedule, click Edit ...
  57. All connections to the new member will use the replication group schedule. To view the replication group schedule, click ...
  58. All crypto sets have been deleted from the IPsec configuration on this computer. IPsec Phase: %1 Store Type: %2 ModifyingUser: ...
  59. All data on the drives to be restored will be replaced with the data in the system image. Are you sure you want to continue? ...
  60. All data sent between the client and the server is protected by encryption based on the maximum key strength supported by ...
  61. All data sent between the client and the server is protected by encryption based on the server's maximum key strength. Clients ...
  62. All data sent between the client and the server uses Federal Information Processing Standard (FIPS) compliant algorithms ...
  63. All data sent from client to server is protected by encryption based on the maximum key strength supported by the client. ...
  64. All directory servers in the following site that can replicate the directory partition over this transport are currently ...
  65. All directory-enabled computers that access the Active Directory in the selected server's domain satisfy the following minimum ...
  66. All disks to be restored will be formatted and replaced with the layout and data in the system image. Are you sure you want ...
  67. All domain controllers have migrated successfully to the Global state (%s). Migration has reached a consistent state on all ...
  68. All domains configured for end-to-end authentication have been removed from the deployment. End-to-end authentication is ...
  69. All event subscription computer names must be unique. The following names are already in the list and will not be added again: ...
  70. All existing connections ({0}) will be deleted at the end of the New Topology Wizard so that the new topology can be created. ...
  71. All file management jobs, reports, and the classification schedule should be compatible with the Task Scheduler 2.0 API on ...
  72. All inbound replication connections for the partition %1 are disabled. Inbound replication of this partition cannot be performed. ...
  73. All incoming COM ports are in use. To assign a COM port to this Bluetooth device, you must first delete an existing incoming ...
  74. All information about which channels you access most frequently will be deleted if you turn off the Most Viewed filter in ...
  75. All Internet Explorer add-ons, such as ActiveX controls or toolbars, are turned off. Some webpages might not display correctly. ...