Windows 7

  1. Blocks third-party cookies that do not have a compact privacy policy - Blocks third-party cookies that save information that ...
  2. Blocks third-party cookies that do not have a compact privacy policy - Blocks third-party cookies that use personally identifiable ...
  3. Blocks third-party cookies that do not have a compact privacy policy - Restricts third-party cookies that save information ...
  4. Bluetooth File Transfer cannot transfer folders. To transfer the contents of a folder, open the folder and select the files ...
  5. Bluetooth transport driver has detected a data integrity error in a bulk data transfer operation: (expected CRC-32 value ...
  6. Bluetooth transport driver has terminated an MTP Bluetooth connection due to failure to recover from a transport error (MTP ...
  7. Boolean indicating that the computer system, with its running operating system, support power management. This boolean does ...
  8. Boolean indicating that the ComputerSystem, with its running OperatingSystem, supports power management. This boolean does ...
  9. Boolean indicating that the Device can be power managed - ie, put into a power save state. This boolean does not indicate ...
  10. Boolean indicating that the Device can be power managed. The use of this property has been deprecated. Instead, the existence ...
  11. Boolean indicating that the DiskPartition is labelled as bootable. This does not mean that an OperatingSystem is actually ...
  12. Boolean indicating that the media access device needs cleaning. Whether manual or automatic cleaning is possible is indicated ...
  13. Boolean indicating that the most recent error was correctable. If the ErrorInfo property is equal to 3, \"OK\", then this ...
  14. Boolean indicating that this card is physically unique from other cards of the same type and therefore requires a special ...
  15. Boolean indicating that this slot is physically unique and may hold special types of hardware, e.g. a graphics processor ...
  16. Boolean indicating whether the address information in the property, ErrorAddress, is a system-level address (TRUE) or a physical ...
  17. Boolean indicating whether the operating system is distributed across several computer system nodes. If so, these nodes should ...
  18. Boolean specifying whether the media is currently write protected by some kind of physical mechanism, such as a protect tab ...
  19. BOOT APPLICATION The following types apply to entries for boot applications. These types also apply to the boot manager, ...
  20. BOOT MANAGER The following types apply only to entries for the boot manager. For information about data formats for these ...
  21. Boot Program Policy: Known client PXE prompt policy: %s New client PXE prompt policy: %s Allow N12 for new clients: %s Architecture ...
  22. BOOT SECTOR Boot Sector type applies to entries that contain bootsector in the form of a file. Currently there are no additional ...
  23. Boot-time synchronization of this link was skipped because the source was taking too long returning updates. Another sync ...
  24. Boris RED v2.0 has a known compatibility issue with this version of Windows and might not run as expected. Boris RED 2.0 ...
  25. Both copies of the file have changed. To change the update action, click the file with the right mouse button. To update, ...
  26. Both LockPermissions and MsiLockPermissionsEx tables were found in the package. Only one of them should be present. This ...
  27. Both the "Do not store certificates in the CA database" option on the Server tab and the "Publish certificate in Active Directory" ...
  28. Both the SMTP server and e-mail name are required in order to enable notification. Specify both names, and then try again. ...
  29. Both the Windows Audio and the Windows Audio End Point Builder services must be running for audio to work correctly. Atleast ...
  30. Both the WS_SECURITY_PROPERTY_ALGORITHM_SUITE_NAME and the WS_SECURITY_PROPERTY_ALGORITHM_SUITE properties were specified. ...
  31. Both this domain and the specified domain This option creates a trust relationship in the local domain and a corresponding ...
  32. Both this domain and the specified domain This option creates trust relationships in both the local and the specified domains. ...
  33. Both VssCopyBackup and VssFullBackup cannot be specified. Choose to create VSS full backups if you are not using any other ...
  34. BranchCache cannot initialize the local cache at location %1. Error: %2 %3 Possible reasons are that the local cache directory ...
  35. BranchCache cannot publish the content at location %1. Error: %2 %3 This might be because the publication directory location ...
  36. BranchCache cannot publish the content with content-id: %2 because the publication cache size was exceeded or the disk does ...
  37. BranchCache Configuration # - pushd BranchCache set service status=%1!s! %2!s! set cachesize size=%3!s! percent=%4!s! set ...
  38. BranchCache enables clients to securely retrieve content from within the branch office instead of having to retrieve it from ...
  39. BranchCache for network files installs the services that are necessary to allow computers in branch offices to cache commonly ...
  40. BranchCache installs the services needed to provide BranchCache client functionality. It also provides BranchCache server ...
  41. BranchCache tried to offer content to the Hosted Cache server on %1, but the request timed out. The Hosted Cache server might ...
  42. BranchCache tried to offer content to the Hosted Cache server on %1, but there was an error connecting to the Hosted Cache ...
  43. BranchCache: Hosted cache could not be authenticated using the provisioned SSL certificate. Domain name of the hosted cache: ...
  44. BranchCache: Received an incorrectly formatted response while discovering availability of content. IP address of the client ...
  45. BranchCache: The hosted cache sent an incorrectly formatted response to the client's message to offer it data. Domain name ...
  46. BranchCache: The message to the hosted cache offering it data is incorrectly formatted. IP address of the client that sent ...
  47. BreachDescription is a free-form string providing more information if the SecurityBreach property indicates that a breach ...
  48. BREAK READWRITE NOREVERTID BREAK is relevant only for hardware shadow copies after import. The shadow copy disk provided ...
  49. Breaks the mirrored volume with focus into two simple volumes. Syntax: BREAK DISK= NOKEEP NOERR DISK= Specifies a disk that ...
  50. Bridge Adapter %2]: The bridge could not determine the network adapter's link speed. The network adapter will not be used. ...
  51. Bridge Adapter %2]: The bridge could not determine the network adapter's MAC address. The network adapter will not be used. ...
  52. Bridge Adapter %2]: The bridge could not modify the network adapter's packet filter. The network adapter will not function ...
  53. Bridge Adapter %2]: The bridge could not retrieve the network adapter's description string. The network adapter will not ...
  54. Brings selected offline volume to the online state. Syntax: ONLINE VOLUME NOERR NOERR For scripting only. When an error is ...
  55. Brings selected online disk to the offline state. Syntax: OFFLINE DISK NOERR NOERR For scripting only. When an error is encountered, ...
  56. Brings selected online volume to the offline state. Syntax: OFFLINE VOLUME NOERR NOERR For scripting only. When an error ...
  57. Brings the selected offline disk to the online state. Syntax: ONLINE DISK NOERR NOERR For scripting only. When an error is ...
  58. Browse before asking. If you have a common question about a product, chances are good that there is already an answer in ...
  59. Browse for a signed file to use as a reference for the rule. Use the slider to select which properties define the rule; as ...
  60. Browse the library for items to add to your playlist. You can add items by dropping them onto the playlist name in the Navigation ...
  61. Browse the tree in Available items to find the files or folders that you want to recover. Click an item in the tree or under ...
  62. Browser customizations are always honored during an Internet Explorer upgrade. If Internet Explorer was using Enhanced Security ...
  63. Browser customizations are always retained during an Internet Explorer upgrade. If Internet Explorer was using Enhanced Security ...
  64. BSS type not allowed - The connection mode setting (any network, infrastructure or ad hoc only) doesn't match the requirements ...
  65. Buffer Dropped Tag=%1 Object=%2 Object Category=%3 Stream=%4 Timestamp=%5 Clock=%6 Sample=%7 Buffer Size=%8 Sample Size=%9 ...
  66. Buffer Input Tag=%1 Object=%2 Object Category=%3 Stream=%4 Timestamp=%5 Clock=%6 Sample=%7 Buffer Size=%8 Sample Size=%9 ...
  67. Buffer Output Tag=%1 Object=%2 Object Category=%3 Stream=%4 Timestamp=%5 Clock=%6 Sample=%7 Buffer Size=%8 Sample Size=%9 ...
  68. Buffer Queued Tag=%1 Object=%2 Object Category=%3 Stream=%4 Timestamp=%5 Clock=%6 Sample=%7 Buffer Size=%8 Sample Size=%9 ...
  69. Buffer returns the requested Descriptor information. If the Descriptor does not exist, the contents of the Buffer are undefined. ...
  70. Build Scatter Gather Cycles/sec is the average rate, in cycles per second, at which NDIS processed building Scatter Gather ...
  71. Build Scatter Gather List Calls/sec is the average rate, in incidents per second, at which NDIS received a request from an ...
  72. Build stacks of cards by arranging them in sequence from high number to low, in alternating suit colors red and black. Click ...
  73. Build stacks of cards by arranging them in sequence from King to Ace in the same suit. Stacks are removed when complete. ...
  74. Burn files in groups and individual files can't be edited or removed after burning. The disc will also work on most computers. ...
  75. By choosing yes, you will have access to the latest online troubleshooters and receive notifications for solutions to known ...