Windows 7

  1. Wireless network association failed. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: ...
  2. Wireless network association started. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: ...
  3. Wireless network association succeeded. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS ...
  4. Wireless network is blocked due to connection failure. Network Adapter: %1 Interface GUID: %2 Connection Mode: %5 Profile ...
  5. Wireless Network Policy Administration. Manage WLAN AutoConfig settings and IEEE 802.1X Security Settings for IEEE 802.11 ...
  6. Wireless Network Settings Print this document and store it in a safe place for future reference. You may need these settings ...
  7. Wireless networks make it possible for network users to access data and resources from multiple locations without relying ...
  8. Wireless security failed. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Peer ...
  9. Wireless security started. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Peer ...
  10. Wireless security started. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Peer ...
  11. Wireless security stopped. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Peer ...
  12. Wireless security succeeded. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Peer ...
  13. With a homegroup, you can share files and printers with other computers running Windows 7. You can also stream media to devices. ...
  14. With a homegroup, you can share files and printers with other home computers running Windows 7. You can also stream media ...
  15. With a load-balanced RD Session Host server farm, you can scale the performance of a single RD Session Host server by distributing ...
  16. With a multicast stream, your streaming media server streams content to a multicast IP address on your multicast-enabled ...
  17. With Active Directory Domain Services (AD DS) installed, you cannot install Certification Authority until you make this server ...
  18. With alias (CNAME) resource records, you can use more than one name to point to a single computer. For example, you can use ...
  19. With BranchCache, clients can be configured to use a hosted cache. This firewall rule opens up the needed ports on the hosted ...
  20. With BranchCache, clients can be configured to use the hosted cache. This firewall rule opens up the needed ports on the ...
  21. With BranchCache, clients use HTTP to retrieve content from each other in the distributed mode, and from the hosted cache ...
  22. With BranchCache, clients use the WS Discovery protocol to lookup content availability on the local subnet. This firewall ...
  23. With File Server Resource Manager (FSRM) you can create quotas to limit the disk space allowed for a volume or folder and ...
  24. With File Server Resource Manager (FSRM) you can generate comprehensive storage reports to analyze the current status of ...
  25. With File Server Resource Manager (FSRM) you can set up file screens to block certain types of files from being saved on ...
  26. With genuine %1 you have access to all %1 updates and can be confident that your %1 software has the latest security and ...
  27. With genuine Windows you have access to all Windows updates and can be confident that your Windows software has the latest ...
  28. With RD Web Access, you can make individual programs that are installed on an RD Session Host server available to users through ...
  29. With Server for NFS, a computer running a Microsoft Windows operating system can act as a Network File System (NFS) server. ...
  30. With Server for NFS, a Windows-based computer can act as a Network File System (NFS) server. Server for NFS enables a Windows-based ...
  31. With Software Restriction Policies, you can define a default security level and rules (exceptions to that default security ...
  32. With the '-d' apply_to switch, the basic format is: MPIODiskNumber LBPolicy Depending on the policy chosen, there may be ...
  33. With the appropriate group policy settings in place you can connect directly using either the computer name or the IP address. ...
  34. With this policy, you can restrict certain HTML Help commands to function only in HTML Help (.chm) files within specified ...
  35. With User Name Mapping, you can create advanced group maps, which associate dissimilarly named Windows and UNIX groups. Advanced ...
  36. With User Name Mapping, you can create advanced user maps, which associate all dissimilarly named Windows and UNIX users. ...
  37. With User Name Mapping, you can create simple identity maps which automatically associate all identically named Windows and ...
  38. With Windows Deployment Services, you can configure the entire deployment process to be performed without user interaction. ...
  39. With Windows Media Center, you can watch and record TV on your computer. If both a standard TV signal and a digital TV antenna ...
  40. With Windows Server Backup you can schedule backups to run once a day or more often, and you can choose to back up the entire ...
  41. With your current power plan, your computer hibernates after %s hours of sleep. While it's hibernating, Windows can't update ...
  42. Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
  43. Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
  44. Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
  45. Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
  46. Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
  47. Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. To ...
  48. WLAN AutoConfig service failed to connect to a wireless network. Network Adapter: %2 Interface GUID: %1 Connection Mode: ...
  49. WLAN AutoConfig service has failed to start the hosted network. Error Code: %2 Error Message: %3 Interface GUID: %1 SSID: ...
  50. WLAN AutoConfig service has failed to stop the hosted network. Error Code: %2 Error Message: %3 Interface GUID: %1 SSID: ...
  51. WLAN AutoConfig service has successfully connected to a wireless network. Network Adapter: %2 Interface GUID: %1 Connection ...
  52. WLAN AutoConfig service has successfully disconnected from a wireless network. Network Adapter: %2 Interface GUID: %1 Connection ...
  53. WLAN AutoConfig service started a connection to a wireless network. Network Adapter: %2 Interface GUID: %1 Connection Mode: ...
  54. WLAN Security Settings: BSS Type %1, Authentication %2, Encryption %3, OneX Enabled %4, Eap Information - Type %5, Vendor ...
  55. WLBS_PORT_OVERLAP At least one of the port numbers in the specified port rule is currently listed in at least one other port ...
  56. WMI allows script-based management of numerous operating system components including disk drives, event logs, network adapter ...
  57. WMI caches provider registration objects to decrease overallexecution time. The substem will drop cache entries either through ...
  58. WMI filters can be linked to Group Policy objects (GPO). If a filter is linked to a GPO, then that GPO applies only to those ...
  59. WMI filters can be linked to Group Policy objects (GPO). If a filter is linked to a GPO, then that GPO applies only to those ...
  60. Wmi Instance Names for the device. This property is useful for mapping from the wmi namespace to the cimv2 namespace classes ...
  61. WMI interop namespace class "%1" has been overwritten. Some of the Interop scenarios might not work properly. Please issue ...
  62. Word cannot save this document because the required encoding file, ieencode.dll, is missing. Please run Setup again, and ...
  63. WordPad does not support all of the features of this document's format. Some content might be missing or displayed improperly. ...
  64. WordPad was unable to open the URL. Check the URL and try again. If you continue to see this problem, you might not have ...
  65. Work network If all the computers on this network are at your workplace, and you recognize them, this is a trusted work network. ...
  66. Work offline anyway All applicable open files will be forced closed and the folder will work offline. This might result in ...
  67. Working Set - Private displays the size of the working set, in bytes, that is use for this process only and not shared nor ...
  68. Working Set - Shared displays the size of the working set, in bytes, that is sharable and may be used by other processes. ...
  69. Working Set is the current size, in bytes, of the Working Set of this process. The Working Set is the set of memory pages ...
  70. Working Set Peak is the maximum size, in bytes, of the Working Set of this process at any point in time. The Working Set ...
  71. Working Set Range Error} An attempt was made to set the working set minimum or maximum to values which are outside of the ...
  72. would parse each line in myfile.txt, ignoring lines that begin with a semicolon, passing the 2nd and 3rd token from each ...
  73. Would you also like to remove Address bar search functionality installed by other programs? If your Internet Explorer Address ...
  74. Would you like to convert the Windows Contact attachment(s) to vCard(s)? vCards are recognized by most applications, but ...
  75. Would you like to create a single partition that stores DNS zone data and replicates that data to all DNS servers that are ...