Windows Server 2008

  1. View and manage Active Directory Federation Services. Active Directory Federation Services enable the use of claims-aware ...
  2. View and manage add-ons that are installed on your computer. Disabling or deleting add-ons might prevent some webpages from ...
  3. View and manage Sites and Services. Sites define the topology and schedules used for Active Directory Domain Services replication. ...
  4. View and modify settings for rights account certificates (RACs) granted by this cluster. RACs identify users to the AD RMS ...
  5. View available wireless networks and connect manually to "%ws" You can also modify the settings and set this computer to ...
  6. View available wireless networks and try connecting to a different network Contact your network administrator for further ...
  7. View available wireless networks You can then select a network and connect to it and save it on the preferred network list. ...
  8. View available wireless networks You can then try connecting to "%ws" again or try connecting to a different network. If ...
  9. View available wireless networks You can then try connecting to "%ws" again or try connecting to a different network. If ...
  10. View available wireless networks You should disconnect, then connect to "%ws" again and enter the correct network security ...
  11. View one or more access points for this service by clicking a binding name. You can then view interfaces and instance information ...
  12. View settings Choose this to view settings and instructions for adding computers and devices to your network that you can ...
  13. View the Network Access Protection event log to determine what prevented the Network Access Protection service from obtaining ...
  14. View the wireless network adapter settings on this computer to verify they are compatible with this network If you set up ...
  15. View the wireless network adapter settings on this computer to verify they are compatible with this network If you set up ...
  16. View the wireless network settings on this computer to verify they are compatible with this network Contact the network administrator ...
  17. View the wireless network settings on this computer to verify they are compatible with this network Contact the network administrator ...
  18. View the wireless security settings on this computer and verify if they are compatible with this network If you set up or ...
  19. View the wireless security settings on this computer to verify they are compatible with this network Contact the network ...
  20. View the wireless security settings on this computer to verify they are compatible with this network If you set up or own ...
  21. View the wireless security settings on this computer to verify they are compatible with this network If you set up or own ...
  22. View wireless network authentication settings for "%ws" You can then disable 802.1X authentication. Before lowering the security ...
  23. View wireless network authentication settings for "%ws" You can then enable 802.1X authentication. If this does not fix the ...
  24. View wireless network priority order You can then change the order that Windows uses to connect to preferred networks when ...
  25. View wireless network security settings for "%ws" You can then type the correct wireless network security key. If the key ...
  26. View wireless security settings for "%ws" If you set up this network, we recommend that you enable security on the wireless ...
  27. View wireless security settings to verify that correct encryption type is selected Contact the network administrator for ...
  28. View wireless security settings to verify that correct network authentication method is selected Contact the network administrator ...
  29. View wireless security settings to verify that correct security type is selected Contact the network administrator for "%ws" ...
  30. Violent actions involving cartoon-like situations and characters. May include violence where a character is unharmed after ...
  31. Violent actions of a fantasy nature, involving human or non-human characters in situations easily distinguishable from real ...
  32. Virtual Bytes is the current size, in bytes, of the virtual address space the process is using. Use of virtual address space ...
  33. Virtual Bytes Peak is the maximum size, in bytes, of virtual address space the process has used at any one time. Use of virtual ...
  34. Virtual Circuit Closed} An existing connection (virtual circuit) has been broken at the remote computer. There is probably ...
  35. Virtual Circuit Closed} The network transport on a remote computer has closed a network connection. There may or may not ...
  36. Virtual Circuit Closed} The network transport on your computer has closed a network connection because it had to wait too ...
  37. Virtual Circuit Closed} The network transport on your computer has closed a network connection. There may or may not be I/O ...
  38. Virtual Disk Service (VDS) is not registered. VDS supports Windows 2003 or later. Check the operating system version on the ...
  39. Virtual machines require virtual networks to communicate with other computers. After you install this role, you can create ...
  40. Virtual Memory Minimum Too Low} Your system is low on virtual memory. Windows is increasing the size of your virtual memory ...
  41. Virtual networks provide the communications channel for virtual machines. You can connect a virtual network to a physical ...
  42. Virtual private connections to your computer through the Internet are possible only if your computer has a known name or ...
  43. Virtualizes the DeleteFile calls that the application makes and hooks other File APIs to ensure the virtualization of the ...
  44. Vistascan has a known compatibility issue with this version of Windows and might not run as expected. The Udnt.sys driver ...
  45. Visual Studio .NET has a known compatibility issue with this version of Windows and might not run as expected. Active Server ...
  46. VisualKB Explorer requires the latest Visual Basic 5.0 run-time files (Msvbvm50.exe) in order to run properly. For more information, ...
  47. Voice Xpress 5.0 has a known compatibility issue with this version of Windows. For an update that is compatible with this ...
  48. Volume %1!s! has %2!d!% free space, but <1% is available for use by Disk Defragmenter (due to reserved system space). To ...
  49. Volume %1!s! has %2!d!% free space, but only %3!d!% is available for use by Disk Defragmenter (due to reserved system space). ...
  50. Volume %1!s! has <1% free space available for use by Disk Defragmenter. To run effectively, Disk Defragmenter requires at ...
  51. Volume %1!s! has a 12-bit FAT partition. Disk Defragmenter does not support 12-bit FAT partitions. To use Disk Defragmenter, ...
  52. Volume %1!s! has only %2!d!% free space available for use by Disk Defragmenter. To run effectively, Disk Defragmenter requires ...
  53. Volume %2 is offline for shadow copy protection. A memory allocation failed. Please try clearing the protection fault or ...
  54. Volume %2 is offline for shadow copy protection. A memory mapping failed. Consider increasing the size of the page file. ...
  55. Volume %2 is offline for shadow copy protection. A read failure occurred during a shadow copy on write operation. Please ...
  56. Volume %2 is offline for shadow copy protection. A read or write error occurred. Please try clearing the protection fault ...
  57. Volume %2 is offline for shadow copy protection. A read or write failure to shadow copy storage occurred. Please ensure that ...
  58. Volume %2 is offline for shadow copy protection. A shadow copy meta data corruption was detected. Please try clearing the ...
  59. Volume %2 is offline for shadow copy protection. An application attempted to write to the shadow copy meta data. If this ...
  60. Volume %2 is offline for shadow copy protection. An error occurred when doing a file system operation. Please try clearing ...
  61. Volume %2 is offline for shadow copy protection. An IO error occurred during shadow copy discovery. Please try clearing the ...
  62. Volume %2 is offline for shadow copy protection. Please try clearing the protection fault or restart the computer. If all ...
  63. Volume %2 is offline for shadow copy protection. The shadow copy storage could not be increased as needed. Please try clearing ...
  64. Volume %2 is offline for shadow copy protection. The shadow copy storage has been exhausted. Please try clearing the protection ...
  65. Volume %2 is offline for shadow copy protection. The shadow copy storage is not present. This volume will go online and its ...
  66. Volume %2 is offline for shadow copy protection. The shadow copy storage was exhausted before conditions permitted it to ...
  67. Volume %2 is offline for shadow copy protection. The shadow copy storage was made inaccessible or removed from the system. ...
  68. Volume '%1' is not supported for shadow copy. It is possible that the volume was removed from the system. Storage reports ...
  69. Volume recovery is not possible because all destination volumes host operating system components. Try to recover your data ...
  70. Volume Shadow Copy Error: After restarting the device %1, Plug and Play reports that a reboot is required. This is an unexpected ...
  71. Volume Shadow Copy Error: An error %1 was encountered while Registry Writer was attempting to initialize itself. This may ...
  72. Volume Shadow Copy Error: An error %1 was encountered while Registry Writer was preparing the registry for a shadow copy. ...
  73. Volume Shadow Copy Error: An error %1 was encountered while trying to initialize the Registry Writer. This may cause future ...
  74. Volume Shadow Copy Error: The Registry Writer experienced an out-of-space condition while preparing the registry for a Shadow ...
  75. Volume Shadow Copy Error: VSS spent more than %1 seconds trying to open and flush all the volumes in the shadow- copy set. ...