Windows 7
- Wireless network association failed. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: ...
- Wireless network association started. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: ...
- Wireless network association succeeded. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS ...
- Wireless network is blocked due to connection failure. Network Adapter: %1 Interface GUID: %2 Connection Mode: %5 Profile ...
- Wireless Network Policy Administration. Manage WLAN AutoConfig settings and IEEE 802.1X Security Settings for IEEE 802.11 ...
- Wireless Network Settings Print this document and store it in a safe place for future reference. You may need these settings ...
- Wireless networks make it possible for network users to access data and resources from multiple locations without relying ...
- Wireless security failed. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Peer ...
- Wireless security started. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Peer ...
- Wireless security started. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Peer ...
- Wireless security stopped. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Peer ...
- Wireless security succeeded. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Peer ...
- With a homegroup, you can share files and printers with other computers running Windows 7. You can also stream media to devices. ...
- With a homegroup, you can share files and printers with other home computers running Windows 7. You can also stream media ...
- With a load-balanced RD Session Host server farm, you can scale the performance of a single RD Session Host server by distributing ...
- With a multicast stream, your streaming media server streams content to a multicast IP address on your multicast-enabled ...
- With Active Directory Domain Services (AD DS) installed, you cannot install Certification Authority until you make this server ...
- With alias (CNAME) resource records, you can use more than one name to point to a single computer. For example, you can use ...
- With BranchCache, clients can be configured to use a hosted cache. This firewall rule opens up the needed ports on the hosted ...
- With BranchCache, clients can be configured to use the hosted cache. This firewall rule opens up the needed ports on the ...
- With BranchCache, clients use HTTP to retrieve content from each other in the distributed mode, and from the hosted cache ...
- With BranchCache, clients use the WS Discovery protocol to lookup content availability on the local subnet. This firewall ...
- With File Server Resource Manager (FSRM) you can create quotas to limit the disk space allowed for a volume or folder and ...
- With File Server Resource Manager (FSRM) you can generate comprehensive storage reports to analyze the current status of ...
- With File Server Resource Manager (FSRM) you can set up file screens to block certain types of files from being saved on ...
- With genuine %1 you have access to all %1 updates and can be confident that your %1 software has the latest security and ...
- With genuine Windows you have access to all Windows updates and can be confident that your Windows software has the latest ...
- With RD Web Access, you can make individual programs that are installed on an RD Session Host server available to users through ...
- With Server for NFS, a computer running a Microsoft Windows operating system can act as a Network File System (NFS) server. ...
- With Server for NFS, a Windows-based computer can act as a Network File System (NFS) server. Server for NFS enables a Windows-based ...
- With Software Restriction Policies, you can define a default security level and rules (exceptions to that default security ...
- With the '-d' apply_to switch, the basic format is: MPIODiskNumber LBPolicy Depending on the policy chosen, there may be ...
- With the appropriate group policy settings in place you can connect directly using either the computer name or the IP address. ...
- With this policy, you can restrict certain HTML Help commands to function only in HTML Help (.chm) files within specified ...
- With User Name Mapping, you can create advanced group maps, which associate dissimilarly named Windows and UNIX groups. Advanced ...
- With User Name Mapping, you can create advanced user maps, which associate all dissimilarly named Windows and UNIX users. ...
- With User Name Mapping, you can create simple identity maps which automatically associate all identically named Windows and ...
- With Windows Deployment Services, you can configure the entire deployment process to be performed without user interaction. ...
- With Windows Media Center, you can watch and record TV on your computer. If both a standard TV signal and a digital TV antenna ...
- With Windows Server Backup you can schedule backups to run once a day or more often, and you can choose to back up the entire ...
- With your current power plan, your computer hibernates after %s hours of sleep. While it's hibernating, Windows can't update ...
- Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
- Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
- Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
- Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
- Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
- Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. To ...
- WLAN AutoConfig service failed to connect to a wireless network. Network Adapter: %2 Interface GUID: %1 Connection Mode: ...
- WLAN AutoConfig service has failed to start the hosted network. Error Code: %2 Error Message: %3 Interface GUID: %1 SSID: ...
- WLAN AutoConfig service has failed to stop the hosted network. Error Code: %2 Error Message: %3 Interface GUID: %1 SSID: ...
- WLAN AutoConfig service has successfully connected to a wireless network. Network Adapter: %2 Interface GUID: %1 Connection ...
- WLAN AutoConfig service has successfully disconnected from a wireless network. Network Adapter: %2 Interface GUID: %1 Connection ...
- WLAN AutoConfig service started a connection to a wireless network. Network Adapter: %2 Interface GUID: %1 Connection Mode: ...
- WLAN Security Settings: BSS Type %1, Authentication %2, Encryption %3, OneX Enabled %4, Eap Information - Type %5, Vendor ...
- WLBS_PORT_OVERLAP At least one of the port numbers in the specified port rule is currently listed in at least one other port ...
- WMI allows script-based management of numerous operating system components including disk drives, event logs, network adapter ...
- WMI caches provider registration objects to decrease overallexecution time. The substem will drop cache entries either through ...
- WMI filters can be linked to Group Policy objects (GPO). If a filter is linked to a GPO, then that GPO applies only to those ...
- WMI filters can be linked to Group Policy objects (GPO). If a filter is linked to a GPO, then that GPO applies only to those ...
- Wmi Instance Names for the device. This property is useful for mapping from the wmi namespace to the cimv2 namespace classes ...
- WMI interop namespace class "%1" has been overwritten. Some of the Interop scenarios might not work properly. Please issue ...
- Word cannot save this document because the required encoding file, ieencode.dll, is missing. Please run Setup again, and ...
- WordPad does not support all of the features of this document's format. Some content might be missing or displayed improperly. ...
- WordPad was unable to open the URL. Check the URL and try again. If you continue to see this problem, you might not have ...
- Work network If all the computers on this network are at your workplace, and you recognize them, this is a trusted work network. ...
- Work offline anyway All applicable open files will be forced closed and the folder will work offline. This might result in ...
- Working Set - Private displays the size of the working set, in bytes, that is use for this process only and not shared nor ...
- Working Set - Shared displays the size of the working set, in bytes, that is sharable and may be used by other processes. ...
- Working Set is the current size, in bytes, of the Working Set of this process. The Working Set is the set of memory pages ...
- Working Set Peak is the maximum size, in bytes, of the Working Set of this process at any point in time. The Working Set ...
- Working Set Range Error} An attempt was made to set the working set minimum or maximum to values which are outside of the ...
- would parse each line in myfile.txt, ignoring lines that begin with a semicolon, passing the 2nd and 3rd token from each ...
- Would you also like to remove Address bar search functionality installed by other programs? If your Internet Explorer Address ...
- Would you like to convert the Windows Contact attachment(s) to vCard(s)? vCards are recognized by most applications, but ...
- Would you like to create a single partition that stores DNS zone data and replicates that data to all DNS servers that are ...