Windows 8.1

  1. This error is returned when not connected to the group while trying to perform an operation that requires connectivity.%0 ...
  2. This error may occur if another service is already using a Named Pipe or RPC trigger for the same endpoint or interface as ...
  3. This error might have been caused by applying the default parameter binding. You can disable the default parameter binding ...
  4. This event collects information to help Microsoft create solutions to problems that are related to the message displayed. ...
  5. This event contains REPAIR PROCEDURES for the 1084 event which has previously been logged. This message indicates a specific ...
  6. This event contains REPAIR PROCEDURES for the 1084 event which has previously been logged. This message indicates a specific ...
  7. This event documents additional REPAIR PROCEDURES to resolve the NTDS KCC Event 1311 on a read-only Active Directory Domain ...
  8. This event documents additional REPAIR PROCEDURES to resolve the NTDS KCC Event 1311 on a read-only Active Directory Lightweight ...
  9. This event indicates an attempt was made to use smartcard logon, but the KDC is unable to use the PKINIT protocol because ...
  10. This event is a periodic update on the remaining total quantity of available account-identifiers (RIDs). The number of remaining ...
  11. This event is expected if the local path of the replicated folder has been changed. If this is not the case, for more information ...
  12. This exit module cannot be configured from this computer. For information about enabling remote configuration, refer to the ...
  13. This extension cannot be disabled because the EnableAllExtensions flag has been set on the snap-in. Call EnableAllExtensions(0) ...
  14. This failover cluster cannot self-update using Cluster-Aware Updating. However, you can use the remote-updating mode of Cluster-Aware ...
  15. This failure might be caused by applying the default parameter binding. You can disable the default parameter binding in ...
  16. This fax cannot be sent at this time. Please launch the Compose Form from Windows Fax and Scan and click on New Fax to attach ...
  17. This feature allows Background Intelligent Transfer Service (BITS) clients that are in the same subnet to locate and share ...
  18. This feature allows File Server Resource Manager to be managed remotely using the File Server Resource Manager snap-in or ...
  19. This feature allows Media Center Extenders to communicate with a computer running Windows Media Center. (Uses SSDP and qWave) ...
  20. This feature allows Network Load Balancing servers to be managed by remote servers running Network Load Balancing Manager. ...
  21. This feature allows other computers to find and communicate with your computer using the Peer Name Resolution Protocol. (Uses ...
  22. This feature allows remote management of the system via WS-Management, a web services-based protocol for remote management ...
  23. This feature allows remote management of Windows by exposing a set of manageable components in a set of classes defined by ...
  24. This feature allows servers running Failover Clustering to communicate with one another (uses TCP and UDP) and to be management ...
  25. This feature allows the transfer of media from your network enabled camera or media device to your computer using the Media ...
  26. This feature allows this computer to discover other devices and be discovered by other devices on the network. (Uses Function ...
  27. This feature allows this computer to share its internet connection with other computers on a private network. (Uses UPnP ...
  28. This feature allows users of this computer to request remote assistance from other users on the network. (Uses UPnP, SSDP, ...
  29. This feature allows you to distribute configurable settings (IP address, DHCP options) to clients based on certain conditions ...
  30. This feature cannot be enabled in the current image because the parent feature(s) are not installed. If you need this feature, ...
  31. This feature coordinates transactions that update transaction-protected resources, such as databases, message queues and ...
  32. This feature enables a Windows Domain Controller to act as a NIS Server and service requests from NIS Clients. (Uses RPC) ...
  33. This feature enables users to connect to projectors over wired or wireless networks to project presentations. (Uses WSDAPI) ...
  34. This feature enables users to logon to the network by means of the domain controller using the Kerberos authentication protocol. ...
  35. This feature frees up 1 on your hard drive. It has 2 of 3 subfeatures selected. The subfeatures free up 4 on your hard drive. ...
  36. This feature frees up 1 on your hard drive. It has 2 of 3 subfeatures selected. The subfeatures require 4 on your hard drive. ...
  37. This feature includes Simple Network Management Protocol agents that monitor the activity in network devices and report to ...
  38. This feature is not compatible with password-protected screen savers. To use this feature, disable the password protection ...
  39. This feature is not supported in Windows 2000. To use other credentials on the selected server, cancel the wizard and restart ...
  40. This feature is only supported with servers running Windows Server 2008 R2 Enterprise or Windows Server 2008 R2 Datacenter. ...
  41. This feature is used for collaborating over a network to share documents, programs or your desktop with other people. (Uses ...
  42. This feature is used for load balancing Remote Desktop client connections between members of a Remote Desktop Gateway server ...
  43. This feature is used for sharing local files and printers with other users on the network. (Uses NetBIOS, LLMNR, SMB and ...
  44. This feature is used to maintain a secure channel between domain clients and a domain controller for authenticating users ...
  45. This feature is used to provide remote management capabilities for the Distributed File System (DFS). (Uses DCOM, WMI and ...
  46. This feature is used to replicate files among multiple servers keeping them in sync. It can be used with DFS-N to provide ...
  47. This feature manages authentication, authorization, auditing and accounting for network connection attempts sent by access ...
  48. This feature offers identity revocation services for PKI (certificate) based services such as secure e-mail smartcard logon, ...
  49. This feature performs TCP/IP configuration for DHCP clients, including dynamic assignments of IP addresses, specification ...
  50. This feature requires 1 on your hard drive. It has 2 of 3 subfeatures selected. The subfeatures free up 4 on your hard drive. ...
  51. This feature requires 1 on your hard drive. It has 2 of 3 subfeatures selected. The subfeatures require 4 on your hard drive. ...
  52. This feed contains a DTD (Document Type Definition). DTDs are used to define a structure of a webpage. Internet Explorer ...
  53. This field, along with a logical network, forms an abstraction of the physical network. A given logical network can contain ...
  54. This field, along with a logical network, forms an abstraction of the physical network. A given logical network can contain ...
  55. This file allows you to preset defaults for Internet Explorer settings which are not set via the IEAK Wizard. Most of these ...
  56. This file cannot be played because the required video decoder is not working, is not installed, or is not supported. Try ...
  57. This file contains a security vulnerability, which has been fixed in more recent versions of the Bing Maps SDK. http://g ...
  58. This file contains a virus or potentially unwanted software and cannot be opened. Due to the nature of this virus or potentially ...
  59. This file contains characters in Unicode format which will be lost if you save this file as an ANSI encoded text file. To ...
  60. This file contains equations that need to be converted with an equation filter. This may pose a security risk if the file ...
  61. This file defines a simplified implementation of the ICRA vocabulary for use in legacy PICS-based systems. The full version ...
  62. This file does not have a program associated with it for performing this action. Please install a program or, if one is already ...
  63. This file does not have a valid digital signature that verifies its publisher. You should only install software from publishers ...
  64. This file does not have a valid digital signature that verifies its publisher. You should only run software from publishers ...
  65. This file does not have a valid digital signature that verifies its publisher. You should only run software from publishers ...
  66. This file does not have a valid digital signature that verifies its publisher. You should only save software from publishers ...
  67. This file does not have burn rights. If you obtained this file from an online store, go to the online store to get burn rights.%0 ...
  68. This file does not have sync rights. If you obtained this file from an online store, go to the online store to get sync rights. ...
  69. This file does not have sync rights. If you obtained this file from an online store, go to the online store to get sync rights.%0 ...
  70. This file is fragmented and is impacting the performance of Windows: File Name : %3 Friendly Name : %5 Version : %7 Thread ...
  71. This file is in a location outside your local network. Files from locations you don't recognize can harm your PC. If you ...
  72. This file is in a location outside your local network. Files from locations you don't recognize can harm your PC. Only open ...
  73. This file is in a location outside your local network. Files from locations you don't recognize can harm your PC. Only open ...
  74. This file is in a location outside your local network. Files from locations you don't recognize can harm your PC. Only run ...
  75. This file is in a location outside your local network. Files from locations you don't recognize can harm your PC. Only run ...