Windows Server 2008
- View and manage Active Directory Federation Services. Active Directory Federation Services enable the use of claims-aware ...
- View and manage add-ons that are installed on your computer. Disabling or deleting add-ons might prevent some webpages from ...
- View and manage Sites and Services. Sites define the topology and schedules used for Active Directory Domain Services replication. ...
- View and modify settings for rights account certificates (RACs) granted by this cluster. RACs identify users to the AD RMS ...
- View available wireless networks and connect manually to "%ws" You can also modify the settings and set this computer to ...
- View available wireless networks and try connecting to a different network Contact your network administrator for further ...
- View available wireless networks You can then select a network and connect to it and save it on the preferred network list. ...
- View available wireless networks You can then try connecting to "%ws" again or try connecting to a different network. If ...
- View available wireless networks You can then try connecting to "%ws" again or try connecting to a different network. If ...
- View available wireless networks You should disconnect, then connect to "%ws" again and enter the correct network security ...
- View one or more access points for this service by clicking a binding name. You can then view interfaces and instance information ...
- View settings Choose this to view settings and instructions for adding computers and devices to your network that you can ...
- View the Network Access Protection event log to determine what prevented the Network Access Protection service from obtaining ...
- View the wireless network adapter settings on this computer to verify they are compatible with this network If you set up ...
- View the wireless network adapter settings on this computer to verify they are compatible with this network If you set up ...
- View the wireless network settings on this computer to verify they are compatible with this network Contact the network administrator ...
- View the wireless network settings on this computer to verify they are compatible with this network Contact the network administrator ...
- View the wireless security settings on this computer and verify if they are compatible with this network If you set up or ...
- View the wireless security settings on this computer to verify they are compatible with this network Contact the network ...
- View the wireless security settings on this computer to verify they are compatible with this network If you set up or own ...
- View the wireless security settings on this computer to verify they are compatible with this network If you set up or own ...
- View wireless network authentication settings for "%ws" You can then disable 802.1X authentication. Before lowering the security ...
- View wireless network authentication settings for "%ws" You can then enable 802.1X authentication. If this does not fix the ...
- View wireless network priority order You can then change the order that Windows uses to connect to preferred networks when ...
- View wireless network security settings for "%ws" You can then type the correct wireless network security key. If the key ...
- View wireless security settings for "%ws" If you set up this network, we recommend that you enable security on the wireless ...
- View wireless security settings to verify that correct encryption type is selected Contact the network administrator for ...
- View wireless security settings to verify that correct network authentication method is selected Contact the network administrator ...
- View wireless security settings to verify that correct security type is selected Contact the network administrator for "%ws" ...
- Violent actions involving cartoon-like situations and characters. May include violence where a character is unharmed after ...
- Violent actions of a fantasy nature, involving human or non-human characters in situations easily distinguishable from real ...
- Virtual Bytes is the current size, in bytes, of the virtual address space the process is using. Use of virtual address space ...
- Virtual Bytes Peak is the maximum size, in bytes, of virtual address space the process has used at any one time. Use of virtual ...
- Virtual Circuit Closed} An existing connection (virtual circuit) has been broken at the remote computer. There is probably ...
- Virtual Circuit Closed} The network transport on a remote computer has closed a network connection. There may or may not ...
- Virtual Circuit Closed} The network transport on your computer has closed a network connection because it had to wait too ...
- Virtual Circuit Closed} The network transport on your computer has closed a network connection. There may or may not be I/O ...
- Virtual Disk Service (VDS) is not registered. VDS supports Windows 2003 or later. Check the operating system version on the ...
- Virtual machines require virtual networks to communicate with other computers. After you install this role, you can create ...
- Virtual Memory Minimum Too Low} Your system is low on virtual memory. Windows is increasing the size of your virtual memory ...
- Virtual networks provide the communications channel for virtual machines. You can connect a virtual network to a physical ...
- Virtual private connections to your computer through the Internet are possible only if your computer has a known name or ...
- Virtualizes the DeleteFile calls that the application makes and hooks other File APIs to ensure the virtualization of the ...
- Vistascan has a known compatibility issue with this version of Windows and might not run as expected. The Udnt.sys driver ...
- Visual Studio .NET has a known compatibility issue with this version of Windows and might not run as expected. Active Server ...
- VisualKB Explorer requires the latest Visual Basic 5.0 run-time files (Msvbvm50.exe) in order to run properly. For more information, ...
- Voice Xpress 5.0 has a known compatibility issue with this version of Windows. For an update that is compatible with this ...
- Volume %1!s! has %2!d!% free space, but <1% is available for use by Disk Defragmenter (due to reserved system space). To ...
- Volume %1!s! has %2!d!% free space, but only %3!d!% is available for use by Disk Defragmenter (due to reserved system space). ...
- Volume %1!s! has <1% free space available for use by Disk Defragmenter. To run effectively, Disk Defragmenter requires at ...
- Volume %1!s! has a 12-bit FAT partition. Disk Defragmenter does not support 12-bit FAT partitions. To use Disk Defragmenter, ...
- Volume %1!s! has only %2!d!% free space available for use by Disk Defragmenter. To run effectively, Disk Defragmenter requires ...
- Volume %2 is offline for shadow copy protection. A memory allocation failed. Please try clearing the protection fault or ...
- Volume %2 is offline for shadow copy protection. A memory mapping failed. Consider increasing the size of the page file. ...
- Volume %2 is offline for shadow copy protection. A read failure occurred during a shadow copy on write operation. Please ...
- Volume %2 is offline for shadow copy protection. A read or write error occurred. Please try clearing the protection fault ...
- Volume %2 is offline for shadow copy protection. A read or write failure to shadow copy storage occurred. Please ensure that ...
- Volume %2 is offline for shadow copy protection. A shadow copy meta data corruption was detected. Please try clearing the ...
- Volume %2 is offline for shadow copy protection. An application attempted to write to the shadow copy meta data. If this ...
- Volume %2 is offline for shadow copy protection. An error occurred when doing a file system operation. Please try clearing ...
- Volume %2 is offline for shadow copy protection. An IO error occurred during shadow copy discovery. Please try clearing the ...
- Volume %2 is offline for shadow copy protection. Please try clearing the protection fault or restart the computer. If all ...
- Volume %2 is offline for shadow copy protection. The shadow copy storage could not be increased as needed. Please try clearing ...
- Volume %2 is offline for shadow copy protection. The shadow copy storage has been exhausted. Please try clearing the protection ...
- Volume %2 is offline for shadow copy protection. The shadow copy storage is not present. This volume will go online and its ...
- Volume %2 is offline for shadow copy protection. The shadow copy storage was exhausted before conditions permitted it to ...
- Volume %2 is offline for shadow copy protection. The shadow copy storage was made inaccessible or removed from the system. ...
- Volume '%1' is not supported for shadow copy. It is possible that the volume was removed from the system. Storage reports ...
- Volume recovery is not possible because all destination volumes host operating system components. Try to recover your data ...
- Volume Shadow Copy Error: After restarting the device %1, Plug and Play reports that a reboot is required. This is an unexpected ...
- Volume Shadow Copy Error: An error %1 was encountered while Registry Writer was attempting to initialize itself. This may ...
- Volume Shadow Copy Error: An error %1 was encountered while Registry Writer was preparing the registry for a shadow copy. ...
- Volume Shadow Copy Error: An error %1 was encountered while trying to initialize the Registry Writer. This may cause future ...
- Volume Shadow Copy Error: The Registry Writer experienced an out-of-space condition while preparing the registry for a Shadow ...
- Volume Shadow Copy Error: VSS spent more than %1 seconds trying to open and flush all the volumes in the shadow- copy set. ...