Windows 8.1

  1. Usage: tlntadmn computer name common_options start | stop | pause | continue | -s | -k | -m | config config_options Use 'all' ...
  2. Usage: To create domain credentials: cmdkey /add:targetname /user:username /pass:password cmdkey /add:targetname /user:username ...
  3. Usage: To create generic credentials: cmdkey /generic:targetname /user:username /pass:password cmdkey /generic:targetname ...
  4. Usage: tracert -d -h maximum_hops -j host-list -w timeout -R -S srcaddr -4 -6 target_name Options: -d Do not resolve addresses ...
  5. Usage: UNMASK LUN {ALL | NONE | ADD WWN= ; ;. | ADD INITIATOR= ; ;.]} UNINSTALL Makes the currently selected LUN accessible ...
  6. Usage: Verify security for an existing replication group, and if necessary repair it. DfsrAdmin {1} {0} /{2} - Verify and ...
  7. Usage: vmw.exe Options Options: /? Display help information /nointro Do not display introduction page /kms MachineName Default ...
  8. Usage: WDSMCAST is a command line utility that you can use to connect a client computer to a namespace or multicast transmission ...
  9. Usage: WDSUTIL is a command line utility used for managing Windows Deployment Services (WDS). Syntax: WDSUTIL Options Command ...
  10. Usage: xwizard ProcessXMLFile /u /m where: /u = unattended (log parsing errors instead of showing them) /m = additionally ...
  11. Usage: xwizard ProcessXMLFile /u /m xwizard RunWizard /u /t /c /f /p /z xwizard RunPropertySheet /u /c /f /p /z where: /c ...
  12. Usage: xwizard RunPropertySheet /u /c /f /p /z where: /u = unattended (log errors instead of showing them) /c = context flags ...
  13. Usage: xwizard RunWizard /u /t /c /f /p /z where: /u = unattended (log errors instead of showing them) /t = optional wizard ...
  14. Usage: {0} parameters Parameters: Target schema: /targetServer server[:port /targetUserName domain\userName (default: NULL) ...
  15. Usage:%1!s! Remarks: This command shows the wired interfaces configured on the system. There are no parameters for this command. ...
  16. USB Selective Suspend allows the hub driver to suspend an individual port without affecting the operation of the other ports ...
  17. USB Setuzoku Camera You Camera Viewer has a known compatibility issue with this version of Windows. For an update that is ...
  18. USBXHCI Controller Error detected. To recover from this Error, Windows may need to reset the Controller and re-enumerate ...
  19. Use "%ws" options to force the delete of the above "%ws" files. Was "%ws" updated? If yes, consider deferring the delete ...
  20. Use %1 to import the certificate in place of a pending request for the same key. Use %2 to import certificates not issued ...
  21. Use 'Routing and Remote Access' in Server Manager to configure one or more DHCP server addresses on the IPv4 DHCP Relay Agent ...
  22. Use 'Routing and Remote Access' in Server Manager to configure one or more DHCP server addresses on the IPv6 DHCPv6 Relay ...
  23. Use 'Routing and Remote Access' in Server Manager to configure the {0} Properties page to enable 'Optional encryption', 'Require ...
  24. Use 'Routing and Remote Access' in Server Manager to enable 'IPv4 Remote access server', 'IPv6 Remote access server', or ...
  25. Use 'Routing and Remote Access' in Server Manager to enable 'Relay DHCP packets' on at least one interface assigned to IPv4 ...
  26. Use 'Routing and Remote Access' in Server Manager to enable 'Relay DHCP packets' on at least one interface assigned to IPv6 ...
  27. Use 'Routing and Remote Access' in Server Manager to increase the number of ports assigned to the tunneling protocols. IKEv2, ...
  28. Use 'Routing and Remote Access' in Server Manager to select 'Enable IPv4 Forwarding' on the Routing and Remote Access Properties ...
  29. Use 'Routing and Remote Access' in Server Manager to select 'Enable IPv6 Forwarding' on the Routing and Remote Access Properties ...
  30. Use 'Routing and Remote Access' in Server Manager to select a certificate to use for SSTP on the Routing and Remote Access ...
  31. Use 'Routing and Remote Access' in Server Manager to select a secure authentication method on the Routing and Remote Access ...
  32. Use 'Routing and Remote Access' in Server Manager to select an adapter on the Routing and Remote Access Properties page. ...
  33. Use a legacy network adapter instead of this network adapter to perform a network-based installation of the guest operating ...
  34. Use a legacy network adapter to perform a network-based installation of the guest operating system, or when integration services ...
  35. Use an existing smart card certificate Search the smart card for an existing file encryption certificate and use it to encrypt ...
  36. Use an instance of this class to allow the client to give a hint to the DS Instance Provider to scope enumerations and queries ...
  37. Use at least SMB protocol version 3.0 configured for continuous availability on file shares that store files for virtual ...
  38. Use authentication to ensure that you are sending the file to the correct device. The authentication also protects the file ...
  39. Use Bing to get search suggestions and web results in Windows Search, and let Microsoft use my search history, location, ...
  40. Use Bing to get search suggestions and web results in Windows Search, and let Microsoft use your location and other info ...
  41. Use CA's registry key %2 - Use CA's restore registry key %3 - Use policy module's registry key %4 - Use first exit module's ...
  42. Use Cluster-Aware Updating to help keep this cluster secure and up-to-date and then open firewall ports to enable updating ...
  43. Use Configuration Agent to apply the configuration at the pending stage. If no configuration is pending we reaplly the current ...
  44. Use Contacts to store contact information, such as e-mail addresses, home or business addresses, and phone numbers. To create ...
  45. Use Credential Security Support Provider (CredSSP) This protocol is less secure than Kerberos, but does not require you to ...
  46. Use Ddpeval.exe to check if Data Deduplication can free up sufficient disk space on the volume. If so, enable Data Deduplication ...
  47. Use deployment-wide licensing settings, as opposed to setting them per-server. If this is set to false, all other licensing ...
  48. Use Device Manager in the guest operating system to enable all storage controllers. If the storage controller is not required, ...
  49. Use Device Manager in the guest operating system to enable all virtual network adapters. If the adapter is not required, ...
  50. Use DFS Management to set the ordering method for namespace root referrals to Lowest Cost on the following namespace: {0} ...
  51. Use DFS Management, the Set-DfsnRoot Windows PowerShell cmdlet, or the Dfsutil command-line tool to disable and then enable ...
  52. Use DFS Replication to replicate data from a server in a branch office to a server in a hub office or data center for backup ...
  53. Use different trust group names in the authorization entries for primary servers with virtual machines that are not part ...
  54. Use Disk Cleanup to reduce the number of unnecessary files on the selected disk to free up disk space and help this computer ...
  55. Use double quotes if a string contains spaces. Default is "*". /k Specifies to search in key names only. /d Specifies the ...
  56. Use email to send an invitation If you use a compatible email program this will start the email program and attach the invitation ...
  57. Use Failover Cluster Manager to configure the Hyper-V Replica Broker. In Hyper-V Manager, ensure that the replication configuration ...
  58. Use Family Safety to get reports of your kids' PC activities, choose what they see online, and set time limits, app restrictions, ...
  59. Use Family Safety to get reports of your kids' PC activities, choose what they see online, and set time limits, apps restrictions, ...
  60. Use File Server Resource Manager to delete unneeded file screens or to consolidate individual file screens. If this is not ...
  61. Use File Server Resource Manager to delete unneeded quotas or to consolidate individual quotas. If this is not possible, ...
  62. Use File Server Resource Manager to set up a schedule for automatic classification that runs before applications or file ...
  63. Use flicks to quickly navigate and perform shortcuts on your computer. If you have a Tablet PC, you can perform flicks using ...
  64. Use Hyper-V Manager or Windows PowerShell to increase the minimum memory and startup memory to at least 128 MB and maximum ...
  65. Use Hyper-V Manager or Windows PowerShell to increase the minimum memory to at least 256 MB, and the startup memory and maximum ...
  66. Use Hyper-V Manager or Windows PowerShell to increase the minimum memory to at least 256 MB, startup memory to at least 512 ...
  67. Use Hyper-V Manager or Windows PowerShell to increase the minimum memory to at least 256 MB, startup memory to at least 512 ...
  68. Use Hyper-V Manager or Windows PowerShell to increase the minimum memory, startup memory and maximum memory to at least 128 ...
  69. Use Hyper-V Manager to create new authorization entries for the specific primary servers and specify separate storage locations ...
  70. Use Hyper-V Manager to increase the minimum memory to at least 256 MB, and the startup memory and maximum memory to at least ...
  71. Use Hyper-V Manager to increase the minimum memory to at least 256 MB, startup memory to at least 512 MB and maximum memory ...
  72. Use Hyper-V Manager to increase the minimum memory to at least 256 MB, startup memory to at least 512 MB and maximum memory ...
  73. Use Hyper-V Manager to modify the replication settings for the virtual machine to perform resynchronization automatically ...
  74. Use Hyper-V Manager to shut down the virtual machine and remove the legacy network adapter. If the virtual machine needs ...
  75. Use Kerberos This protocol is more secure but requires you to set up constrained delegation in your environment to perform ...