Windows 8.1

  1. This website has been reported to Microsoft to contain threats to your computer, personal or financial information. Microsoft ...
  2. This website is using a scripted window to ask you for information. If you trust this website, click here to allow scripted ...
  3. This website may not be designed for viewing from a distance or for remote control interaction. Do you want to view it in ...
  4. This website may not be designed for viewing from a distance or for remote control interaction. To view the website at a ...
  5. This website must be opened and viewed in your Web browser on the computer to perform an installation or other task. The ...
  6. This website must be opened and viewed in your Web browser to perform an installation or other task. The remote control cannot ...
  7. This website uses the Secure Sockets Layer (SSL) protocol, and requires an HTTPS address. Please update the URL in your browser. ...
  8. This website wants to install the following add-on: %1!s!' from %2!s!'. If you trust the website and the add-on and want ...
  9. This website wants to run the following add-on: %1!s!' from %2!s!'. If you trust the website and the add-on and want to allow ...
  10. This will attempt to load all authoritative DNS servers capable of DNSSEC online signing. This operation might require several ...
  11. This will attempt to validate if Key Master %1 is capable of DNSSEC online signing for the zone %2. This operation might ...
  12. This will automatically take snapshots of the screen as you reproduce the problem. You can then send these to your friend ...
  13. This will be returned when no more objects are available, the number of objects returned is less than the number requested, ...
  14. This will bind the volume or device so that on system restart it is more readily available for use by the program or service. ...
  15. This will cause Cluster-Aware Updating to disconnect from {0} and attempt to connect to {1}. If an Updating Run is in progress ...
  16. This will cause Cluster-Aware Updating to disconnect from {0} and stop the Updating Run currently in progress on {0}. Also, ...
  17. This will cause Cluster-Aware Updating to stop the Updating Run in progress on the cluster {0}. Click OK to stop the Updating ...
  18. This will clear your local search history and some Bing search history used to personalize your Windows search experience. ...
  19. This will create Reps-To attribute on the domain controller for the specified naming context. Ordinarily there is no requirement ...
  20. This will delete all the system state backups of the server at the specified location. If the specified volume contains backups ...
  21. This will delete all the trust anchors (both DnsKey and DS) associated with the trust point %1 on server %2. Do you want ...
  22. This will enable the Internet Explorer Content Advisor and add the selected ratings provider. Are you sure you want to continue? ...
  23. This will enable the Internet Explorer Content Advisor and import the selected PICSRules file. Are you sure you want to continue? ...
  24. This will generate a cryptographic mode 2 certificate which will become the SLC when the cluster is updated to cryptographic ...
  25. This will hide the display of the namespace "{0}" from your console. This will not affect client access to the namespace ...
  26. This will make the server %1 the Key Master for the zone %2. The Key Master cannot be contacted to transfer private key material. ...
  27. This will make the server %1 the Key Master for the zone %2. The Key Master cannot be contacted to transfer private key material. ...
  28. This will move the selected computers from this group and all of its subgroups to the {0} group. Are you sure you want to ...
  29. This will only clear your local search history because you are not getting personalized search suggestions and web results ...
  30. This will overwrite the settings for the existing scheduled backup and may cause the existing backups to be lost either at ...
  31. This will overwrite the settings of an existing Starter GPO in the domain with that of the loaded CAB file. Click on OK to ...
  32. This will overwrite your existing scheduled backup and might cause your existing backups to become inaccessible. To ensure ...
  33. This will pre-generate a cryptographic mode 2 key pair on on this computer using a different CSP than was used for cryptographic ...
  34. This will remove the associated namespace folder for the replicated folder '{0}'. Shared folders on the members will not ...
  35. This will remove the replication group "{0}" from your console. This will not delete the replication group. Do you want to ...
  36. This will remove your personal files and apps from your PC and restore all settings to their defaults. If you use File History, ...
  37. This will remove your personal files and apps from your PC and restore all settings to their defaults. If you use File History, ...
  38. This will replace explicitly defined permissions on all descendants of this object with inheritable permissions from %1. ...
  39. This will stop replication between the targets of folder "{0}". The replicated folder "{1}" will be deleted. If this is the ...
  40. This will update the Reps-To attribute on the domain controller for the specified naming context. More specifically it updates ...
  41. This window contains information about the currently playing item or information related to a pending sync or burn operation. ...
  42. This Windows image cannot upgrade to the edition of Windows that was specified. The upgrade cannot proceed. Run the /Get-TargetEditions ...
  43. This Windows PowerShell snap-in contains cmdlets (such as Get-WSManInstance and Set-WSManInstance) that are used by the Windows ...
  44. This Windows PowerShell snap-in contains cmdlets (such as Start-Transcript and Stop-Transcript) that are provided for use ...
  45. This WINS computer has %1 processors. It has %2 bytes of physical memory and %3 bytes of memory available for allocation. ...
  46. This wizard adds an install image to your server. You must have at least one install image and one boot image on your server ...
  47. This wizard adds driver packages to a boot image. Before continuing, you should back up this image. To do this, right-click ...
  48. This wizard adds driver packages to your server. Once the packages are on your server, you can define which client computers ...
  49. This wizard adds one or more nodes (servers) to an existing cluster. All nodes in a cluster should use the same hardware, ...
  50. This wizard allows you to add {0} servers to your deployment. Select the servers on which to install the {0} role service. ...
  51. This wizard allows you to create a session collection. A session collection consists of one or more Remote Desktop Session ...
  52. This wizard allows you to create a virtual desktop collection. A virtual desktop collection consists of one or more virtual ...
  53. This wizard allows you to create the first domain controller in your network. If you have an existing domain, you can still ...
  54. This wizard allows you to remove RD Session Host servers that are not part of any collection from your deployment. Select ...
  55. This wizard allows you to remove {0} servers from your deployment. Select the servers from which to remove the {0} role service. ...
  56. This wizard also allows you to choose and optionally create an IPAM database. Local security groups are also created during ...
  57. This wizard cannot continue because Internet connection sharing (ICS) and/or Internet Connection Firewall (ICF) is already ...
  58. This wizard cannot continue because Internet connection sharing (ICS) and/or Internet Connection Firewall (ICF) is already ...
  59. This wizard cannot continue because no network connections were detected on this server. Shut down this computer and install ...
  60. This wizard cannot continue because the required protocols are not available on %s. Add the required protocols, and then ...
  61. This wizard cannot continue because there are not enough network connections. A VPN server must have at least one permanent ...
  62. This wizard captures an operating system (including custom applications and configuration settings) and saves it as an install ...
  63. This wizard configures DirectAccess with default settings. To configure additional settings, click the Configuration node ...
  64. This wizard configures high availability for a role. After you successfully complete this wizard, if a clustered server fails ...
  65. This wizard creates a bootable USB flash drive that you can use to perform a full system restore on your client computer ...
  66. This wizard creates a capture image from a boot image, and saves it to the location that you specify. At the end of this ...
  67. This wizard creates a cluster, which is a set of servers that work together to increase the availability of clustered roles. ...
  68. This wizard creates a multicast transmission for an image. Once created, Windows Deployment Services will transmit the image ...
  69. This wizard detects the inbound ports that are listened to by this server. Before continuing, make sure that all applications ...
  70. This wizard does not install components or set up a server to perform specific roles. To do this, run the Server Manager. ...
  71. This wizard does not support changing quota type (auto and non-auto). Please use File Server Resource Manager to change quota ...
  72. This wizard examines the backup database for the selected computer and attempts to repair the backup database if errors are ...
  73. This wizard guides you through configuring the quorum for your failover cluster. The relevant cluster elements are the nodes ...
  74. This wizard helps you add a port for a network printer. Before continuing be sure that: 1. The device is turned on. 2. The ...
  75. This wizard helps you apply updates immediately to this computer and the other nodes in the failover cluster ({0}). The Updating ...