Windows Server 2008

  1. Making changes to your TV signal source may require you to reset your TV Program Guide listings. Select Set Up Guide listings ...
  2. Making the backup process even easier, the Back Up Files wizard provides additional options regarding backup destination, ...
  3. Making this folder private will prevent all of its subfolders from being shared on the network. Are you sure you want to ...
  4. Making your Windows-based workstations more versatile, Subsystem for UNIX-Based Applications (SUA) enables you to run UNIX-based ...
  5. Manage auditing and security log This security setting determines which users can specify object access auditing options ...
  6. Manage the certificate templates on a different writable domain controller by changing the writable domain controller that ...
  7. manage-bde -autounlock -enable Volume manage-bde -autounlock -disable Volume manage-bde -autounlock -clearallkeys OSVolume ...
  8. manage-bde -on Volume {-RecoveryPassword|-rp} NumericalPassword {-RecoveryKey|-rk} PathToExternalKeyDirectory {-StartupKey|-sk} ...
  9. manage-bde -protectors -add Volume {-RecoveryPassword|-rp} NumericalPassword {-RecoveryKey|-rk} PathToExternalKeyDirectory ...
  10. manage-bde -protectors -delete Volume {-Type|-t} {RecoveryPassword| ExternalKey| TPM| TPMAndStartupKey| TPMAndPIN TPMAndPINAndStartupKey} ...
  11. manage-bde -protectors -get Volume -parameter arguments manage-bde -protectors -add Volume -parameter arguments manage-bde ...
  12. manage-bde -protectors -get Volume {-Type|-t} {RecoveryPassword| ExternalKey| TPM| TPMAndStartupKey| TPMAndPIN| TPMAndPINAndStartupKey} ...
  13. manage-bde -unlock Volume {[{-RecoveryPassword| -rp} NumericalPassword | {-RecoveryKey|-rk} PathToExternalKeyFile]} {-ComputerName|-cn} ...
  14. ManagedElement is an abstract class that provides a common superclass (or top of the inheritance tree) for the non-association ...
  15. Management Rules specifying Equal Per Process or Equal Per User can only be applied for allocations that are not suballocated. ...
  16. Management Service provides infrastructure to configure the IIS 7.0 user interface, IIS Manager, for remote management in ...
  17. Management Tools provide infrastructure to manage a Web server that runs IIS 7. You can use the IIS user interface, command-line ...
  18. Manages access to smart cards read by this computer. If this service is stopped, this computer will be unable to read smart ...
  19. Manages and catalogs removable media and operates automated removable media devices. If this service is stopped, programs ...
  20. Manages and implements the backup infrastructure including shadow copies. If this service is disabled shadow copy creation ...
  21. Manages and implements Volume Shadow Copies used for backup and other purposes. If this service is stopped, shadow copies ...
  22. Manages audio devices for the Windows Audio service. If this service is stopped, audio devices and effects will not function ...
  23. Manages audio devices for the Windows Audio service. If this service is stopped, audio devices and effects will not function ...
  24. Manages audio for Windows-based programs. If this service is stopped, audio devices and effects will not function properly. ...
  25. Manages audio for Windows-based programs. If this service is stopped, audio devices and effects will not function properly. ...
  26. Manages authentication, authorization, auditing and accounting for virtual private network (VPN), dial-up, 802.1x wireless ...
  27. Manages authentication, authorization, auditing, and accounting for VPN, dial-up, 802.1x wireless or Ethernet switch connection ...
  28. Manages CD recording using Image Mastering Applications Programming Interface (IMAPI). If this service is stopped, this computer ...
  29. Manages CPU for a local or remote Microsoft Windows Server. Advanced options permit hard affinity of groups of processes ...
  30. Manages CPU for a local or remote Windows Server 2003, Enterprise and Datacenter Editions. Advanced options permit hard affinity ...
  31. Manages dial-up and virtual private network (VPN) connections from this computer to the Internet or other remote networks. ...
  32. Manages Internet SCSI (iSCSI) sessions from this computer to remote iSCSI target devices. If this service is stopped, this ...
  33. Manages objects in the Network and Dial-Up Connections folder, in which you can view both local area network and remote connections. ...
  34. Manages requests made by Pre-Boot eXecution Environment (PXE) - enabled client computers. If this service is stopped, PXE-enabled ...
  35. Manages requests made by Pre-Boot eXecution Environment (PXE) - enabled client computers. If this service is stopped, PXE-enabled ...
  36. Manages software-based volume shadow copies taken by the Volume Shadow Copy service. If this service is stopped, software-based ...
  37. Manages the configuration and tracking of Component Object Model (COM)+-based components. If the service is stopped, most ...
  38. Manual backup and restore allows you to perform an immediate backup or restoration of the WMI repository to/from a file you ...
  39. Manually configure settings Windows will open a configuration page. Under PPoE settings, type the router password (check ...
  40. Manually control the level of acceleration and performance supplied by your graphics hardware. Use the Display Troubleshooter ...
  41. Manually create a network profile This creates a new network profile or locates an existing network and saves a profile for ...
  42. Manufactured under license from Dolby Laboratories. "Dolby" and the double-D symbol are registered trademarks of Dolby Laboratories. ...
  43. Many APIs use much more stack space on NT than Win9x. This compatibility fix is command line driven and takes a list of APIs ...
  44. Many devices include sensors or have sensors installed nearby, in order to measure critical input and output properties. ...
  45. Many devices, such as processors or power supplies, require their own cooling devices. This association indicates where fans ...
  46. Many Internet sites use more than one domain to host their content. You may have to add several domains to the Trusted sites ...
  47. Many of the application compatibility strategies in Windows XP depend on "matching information", which will help to identify ...
  48. Many organizations have offices located in different geographical locations, requiring remote site connectivity. You can ...
  49. Many organizations use a registration authority (RA) to manage certificate requests. Use the following certificate to sign ...
  50. Many Windows 9x applications were not programmed to respond to task switches caused by pressing Alt-Tab, the Windows key, ...
  51. Map cache file doesn't exist or corrupted. Corrective action taken: Regenerating the map cache file. Domain: %1, Map Name: ...
  52. Map is already defined. Current field definition - Key Field Number = '%1',Field Separator = '%2', New field definition - ...
  53. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  54. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  55. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  56. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  57. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  58. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  59. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  60. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  61. Mapped View Alignment Incorrect} An attempt was made to map a view of a file, but either the specified base address or the ...
  62. Mapping from the Drive Information you provided to a piece of Physical Media failed. Either the Drive (+Changer) Information ...
  63. Mapping from the Slot Information you provided to a piece of Physical Media failed. Either the Slot (+Changer) Information ...
  64. March 2001 Application Compatibility Package is incompatible with this version of Windows. All of its features are currently ...
  65. Marking an FT (fault tolerant) volume active will only mark underlying partitions active if they are primary partitions. ...
  66. MASK MASK is relevant only for hardware shadow copies after import. The shadow copy disk is removed from the machine and ...
  67. Master Stats: - Notifies Sent = %1!10lu! Requests = %2!10lu! NameError = %3!10lu! FormError = %4!10lu! Refused = %5!10lu! ...
  68. Mastered - Readable on all computers and some CD/DVD players. Requires you to write all files at once, and individual files ...
  69. MaxBurstLength is not serially greater than FirstBurstLength. Dump data contains FirstBurstLength followed by MaxBurstLength. ...
  70. Maximum acceptable directory search response time (in milliseconds). This rule will issue a warning if the search response ...
  71. Maximum amount of time, in seconds, dirty lines or buckets may remain in the cache before they are flushed. A value of zero ...
  72. Maximum application log size This security setting specifies the maximum size of the application event log, which has a maximum ...
  73. Maximum command sequence number is not serially greater than expected command sequence number in login response. Dump data ...
  74. Maximum length of a filename component supported by the Windows drive. A filename component is that portion of a filename ...
  75. Maximum lifetime for service ticket This security setting determines the maximum amount of time (in minutes) that a granted ...