Windows 8.1

  1. Verify that the driver to support SR-IOV (supplied by the vendor of the network adapter) is installed in the guest operating ...
  2. Verify that the file location and that the information in the file contains the expected owner password. If you built the ...
  3. Verify that the files you want to replicate are closed and have no open handles to them. For information about troubleshooting ...
  4. Verify that the files you want to replicate are closed and have no open handles to them. For information about troubleshooting ...
  5. Verify that the files you want to replicate are closed and have no open handles to them. For information about troubleshooting ...
  6. Verify that the network cable is connected, and that a DHCP server is available or the computer is configured to use a static ...
  7. Verify that the network connections of this computer are configured with the correct IP addresses of the DNS servers to be ...
  8. Verify that the path to the migration store is valid. If the path is a local path, verify that the drive specified exists ...
  9. Verify that the service is running by typing 'Get-Service iphlpsvc' at a Windows PowerShell command prompt. 2. Enable (Start-Service ...
  10. Verify that the wireless security settings on this computer are compatible with "%ws" If you set up or own this network, ...
  11. Verify that you are using the correct authentication type. For Basic and Digest authentication types, the session configuration ...
  12. Verify that you typed "%ShareName%" correctly, and then try again Windows can't find "%UNCPath%". The following names are ...
  13. Verify that you typed "%ShareName%" correctly, and then try again Windows can't find "%UNCPath%". The following names are ...
  14. Verify that you typed "%ShareName%" correctly, and then try again Windows can't find "%UNCPath%". The name might be misspelled. ...
  15. Verify that you typed the name correctly, and then try again Windows can't find "%UNCPath%". The following names are similar: ...
  16. Verify that you typed the name correctly, and then try again Windows can't find "%UNCPath%". The following names are similar: ...
  17. Verify that you typed the name correctly, and then try again Windows can't find "%UNCPath%". The name might be misspelled. ...
  18. Verify that your wireless network adapter settings are compatible with "%SSID%" If you set up or own this network, change ...
  19. Verify the information in the file contains the expected owner password content. If you built the file manually, verify that ...
  20. Verify the network security key for "%ws" If the key is correct, check for possible sources of interference such as microwave ...
  21. Verify the network security key for "%ws" View the security settings. You can then type the correct wireless network security ...
  22. Verify the network security key for "%ws" View the security settings. You can then type the correct wireless network security ...
  23. Verify the network security key for "%ws" You should disconnect and then connect to this network again. You can then enter ...
  24. Verify the network security key for "%ws" You should disconnect if you're connected, and then connect to this network again. ...
  25. Verify the path points to a correct network location and that the supplied credentials can be used for write access to the ...
  26. Verify the Relying Party Trust Identifier within Active Directory Federation Services has the expected value for the AD RMS ...
  27. Verify the Relying Party Trust Identifier within Active Directory Federation Services has the expected value for the AD RMS ...
  28. Verifying Disk} The media has changed and a verify operation is in progress so no reads or writes may be performed to the ...
  29. Verifying that, for each cluster network, all adapters are consistently configured with either DHCP or static IP addresses. ...
  30. Verifying the current media failed. The media might be corrupted. You can retry the current media. If the issue persists, ...
  31. Version information of the current or last running operating system on this physical computer system. See CIM_OperatingSystem.Version ...
  32. Version not supported for Virtual device type %3 in virtual machine object %1. (Virtual machine object ID %2. Virtual device ...
  33. Version number mismatch. Version number of server should be equal to that of client. Version number on NT is %1, on UNIX ...
  34. Version number of the specified file system. This is currently only valid for UDF. The default value (zero) will cause the ...
  35. Versions of Windows that require LAN Manager authentication include Windows for Workgroups, Windows CE 4.0, and Windows 95, ...
  36. VHD file with non-4KB-aligned metadata is not supported. Please convert the VHD file (%1) to an aligned layout with PowerShell ...
  37. VHD operations do not support the /Optimize or /CheckIntegrity arguments. The unsupported arguments were ignored. For more ...
  38. VHD-format differencing virtual hard disks could experience consistency issues if a power failure occurs. Consistency issues ...
  39. VHD-format dynamic virtual hard disks are not recommended for virtual machines that run server workloads in a production ...
  40. VHD-format dynamic virtual hard disks could experience consistency issues if a power failure occurs. Consistency issues can ...
  41. Video cannot be displayed because a required security component is not installed. Please contact the computer hardware manufacturer ...
  42. Video cannot be displayed because an audio device has not been detected. Verify that your audio device is properly installed ...
  43. Video memory resources are over-utilized and there is thrashing happening as a result. Reducing number of running programs ...
  44. Video memory resources are over-utilized. Reducing number of running programs and open windows may help resolve this condition ...
  45. View and change system and security status, back up and restore file and system settings, update your computer, view RAM ...
  46. View and manage Sites and Services. Sites define the topology and schedules used for Active Directory Domain Services replication. ...
  47. View and modify settings for rights account certificates (RACs) granted by this cluster. RACs identify users to the AD RMS ...
  48. View available wireless networks and try connecting to a different network Contact your network administrator for further ...
  49. View available wireless networks You can then try connecting to "%ws" again or try connecting to a different network. If ...
  50. View available wireless networks You should disconnect, then connect to "%ws" again and enter the correct network security ...
  51. View information about currently applied firewall and connection security rules and security associations for active network ...
  52. View is an abstract class that provides a common superclass for classes providing de-normalized, aggregate representations ...
  53. View the wireless network adapter settings on this computer to verify they are compatible with this network If you set up ...
  54. View the wireless network adapter settings on this computer to verify they are compatible with this network If you set up ...
  55. View the wireless network settings on this computer to verify they are compatible with this network Contact the network administrator ...
  56. View the wireless network settings on this computer to verify they are compatible with this network Contact the network administrator ...
  57. View the wireless security settings on this computer to verify they are compatible with this network Contact the network ...
  58. View wireless network authentication settings for "%ws" You can then enable 802.1X authentication. If this does not fix the ...
  59. View wireless security settings to verify that correct encryption type is selected Contact the network administrator for ...
  60. View wireless security settings to verify that the correct network authentication method is selected Contact the network ...
  61. Violent actions involving cartoon-like situations and characters. May include violence where a character is unharmed after ...
  62. Violent actions of a fantasy nature, involving human or non-human characters in situations easily distinguishable from real ...
  63. Virtual Bytes is the current size, in bytes, of the virtual address space the process is using. Use of virtual address space ...
  64. Virtual Bytes Peak is the maximum size, in bytes, of virtual address space the process has used at any one time. Use of virtual ...
  65. Virtual Circuit Closed} An existing connection (virtual circuit) has been broken at the remote computer. There is probably ...
  66. Virtual Circuit Closed} The network transport on a remote computer has closed a network connection. There may or may not ...
  67. Virtual Circuit Closed} The network transport on your computer has closed a network connection because it had to wait too ...
  68. Virtual Circuit Closed} The network transport on your computer has closed a network connection. There may or may not be I/O ...
  69. Virtual desktop settings are used to configure virtual desktops that are being created from the virtual desktop template. ...
  70. Virtual desktops with no user connected are recreated immediately. Virtual desktops that have a user connected are recreated ...
  71. Virtual disk '%3' failed to open because a problem occurred when attempting to open a virtual disk in the differencing chain, ...
  72. Virtual disk '%3' failed to open because a problem occurred when attempting to open a virtual disk in the differencing chain, ...
  73. Virtual Disk Service (VDS) is not registered. VDS supports Windows 2003 or later. Check the operating system version on the ...
  74. Virtual disks that use storage tiers can contain only one volume. If the volume isn't the same size as the virtual disk, ...
  75. Virtual domain controller cloning failed to bind to the primary domain controller %1. The returned error code is %2 (%3). ...