Windows Server 2008

  1. Wireless security started. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Peer ...
  2. Wireless security stopped. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Peer ...
  3. Wireless security succeeded. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Peer ...
  4. With a built-in firewall, Windows Defender, and built-in phishing filters for Windows Mail and Internet Explorer 7, Windows ...
  5. With a load-balanced terminal server farm, you can scale the performance of a single terminal server by distributing Terminal ...
  6. With a multicast stream, your streaming media server streams content to a multicast IP address on your multicast-enabled ...
  7. With Active Directory Domain Services (AD DS) installed, you cannot install Certification Authority until you make this server ...
  8. With alias (CNAME) resource records, you can use more than one name to point to a single computer. For example, you can use ...
  9. With File Server Resource Manager (FSRM) you can create quotas to limit the disk space allowed for a volume or folder and ...
  10. With File Server Resource Manager (FSRM) you can generate comprehensive storage reports to analyze the current status of ...
  11. With File Server Resource Manager (FSRM) you can set up file screens to block certain types of files from being saved on ...
  12. With Remote Assistance, you can invite someone you trust to connect to your computer and help you with a computer problem. ...
  13. With Server for NFS, a computer running a Microsoft Windows operating system can act as a Network File System (NFS) server. ...
  14. With Server for NFS, a Windows-based computer can act as a Network File System (NFS) server. Server for NFS enables a Windows-based ...
  15. With simplified tools for uploading, cropping, cutting, and creating photos, Windows Vista makes it easier and more enjoyable ...
  16. With Software Restriction Policies, you can define a default security level and rules (exceptions to that default security ...
  17. With the Cleaning Plate still in place, insert the second sheet of plain paper into the Auto Feeder to remove any remaining ...
  18. With this training, you can learn how to use your finger to open and close programs, to right-click, and more. You can also ...
  19. With TS Web Access, you can make individual programs that are installed on a terminal server available to users through a ...
  20. With User Name Mapping, you can create advanced group maps, which associate dissimilarly named Windows and UNIX groups. Advanced ...
  21. With User Name Mapping, you can create advanced user maps, which associate all dissimilarly named Windows and UNIX users. ...
  22. With User Name Mapping, you can create simple identity maps which automatically associate all identically named Windows and ...
  23. With Windows Media Center, you can watch and record TV on your computer. If both a standard TV signal and a Digital TV antenna ...
  24. With Windows Media Center, you can watch, pause, or record live TV so that you never miss a moment of your favorite show ...
  25. With Windows Media Center, your PC becomes the convenient hub for all your home entertainment needs, such as watching live ...
  26. With Windows Server Backup you can schedule backups to run once a day or more often, and you can choose to back up the entire ...
  27. With Windows Vista, you've got the hottest titles, the latest features, the most vivid 3-D graphics, and so many ways to ...
  28. With your current power plan, your computer hibernates after %s hours of sleep. While it's hibernating, Windows can't update ...
  29. Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
  30. Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
  31. Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
  32. Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
  33. Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
  34. Without a recovery password, you could permanently lose access to your protected files if BitLocker Drive Encryption encounters ...
  35. WLAN AutoConfig service failed to connect to a wireless network. Network Adapter: %2 Interface GUID: %1 Connection Mode: ...
  36. WLAN AutoConfig service has successfully connected to a wireless network. Network Adapter: %2 Interface GUID: %1 Connection ...
  37. WLAN AutoConfig service has successfully disconnected from a wireless network. Network Adapter: %2 Interface GUID: %1 Connection ...
  38. WLAN AutoConfig service started a connection to a wireless network. Network Adapter: %2 Interface GUID: %1 Connection Mode: ...
  39. WLBS_PORT_OVERLAP At least one of the port numbers in the specified port rule is currently listed in at least one other port ...
  40. WMI allows script-based management of numerous operating system components including disk drives, event logs, network adapter ...
  41. WMI caches provider registration objects to decrease overallexecution time. The substem will drop cache entries either through ...
  42. WMI filters can be linked to Group Policy objects (GPO). If a filter is linked to a GPO, then that GPO applies only to those ...
  43. WMI filters can be linked to Group Policy objects (GPO). If a filter is linked to a GPO, then that GPO applies only to those ...
  44. Wmi Instance Names for the device. This property is useful for mapping from the wmi namespace to the cimv2 namespace classes ...
  45. Word cannot save this document because the required encoding file, ieencode.dll, is missing. Please run Setup again, and ...
  46. Work Choose this for a workplace or similar location. Your computer is discoverable and you can see other computers and devices. ...
  47. Work offline anyway All applicable open files will be forced closed and the folder will work offline. This may result in ...
  48. Working Set - Private displays the size of the working set, in bytes, that is use for this process only and not shared nor ...
  49. Working Set - Shared displays the size of the working set, in bytes, that is sharable and may be used by other processes. ...
  50. Working Set is the current size, in bytes, of the Working Set of this process. The Working Set is the set of memory pages ...
  51. Working Set Peak is the maximum size, in bytes, of the Working Set of this process at any point in time. The Working Set ...
  52. Working Set Range Error} An attempt was made to set the working set minimum or maximum to values which are outside of the ...
  53. would parse each line in myfile.txt, ignoring lines that begin with a semicolon, passing the 2nd and 3rd token from each ...
  54. Would you also like to remove Address bar search functionality installed by other programs? If your Internet Explorer Address ...
  55. Would you like to create a single partition that stores DNS zone data and replicates that data to all DNS servers that are ...
  56. Would you like to create a single partition that stores DNS zone data and replicates that data to all DNS servers that are ...
  57. Would you like to import your original wallpaper into the Active Desktop? This will restore your wallpaper to the way it ...
  58. wpeutil options is required, and options are specific to each command. Commands: CreatePageFile /path= /size= Creates a page ...
  59. Write Bytes Cache/sec is the rate at which applications on your computer are writing to the file system cache by using the ...
  60. Write Bytes Network/sec is the rate at which applications are writing data across the network. This occurs when the file ...
  61. Write Bytes Non-Paging/sec is the rate at which bytes are written by the Redirector in response to normal file outputs by ...
  62. Write Bytes Paging/sec is the rate at which the Redirector is attempting to write bytes changed in the pages being used by ...
  63. Write Bytes/sec is the rate the server is writing data to files for the clients on this CPU. This value is a measure of how ...
  64. Write Copies/sec is the rate at which page faults are caused by attempts to write that have been satisfied by coping of the ...
  65. Write down your key, take it to your other computer, start Windows Easy Transfer, and then follow the instructions on the ...
  66. Write Free Media Label operation on Media %1 was cancelled. Media was left in the UNPREPARED state and must be prepared via ...
  67. Write Operations Random/sec is the rate at which, on a file-by-file basis, writes are made that are not sequential. If a ...
  68. Write Operations/sec is the rate the server is performing file write operations for the clients on this CPU. This value is ...
  69. Write Packets Small/sec is the rate at which writes are made by applications that are less than one-fourth of the server's ...
  70. Write Packets/sec is the rate at which writes are being sent to the network. Each time a single packet is sent with a request ...
  71. Write Protect Error} The disk cannot be written to because it is write protected. Please remove the write protection from ...
  72. Writer status is not available for one or more writers. A writer may have reached the limit to the number of available backup-restore ...
  73. WRITER { VERIFY | EXCLUDE } VERIFY Specify that the backup or restore operation must fail if the writer or component is not ...
  74. Writes Denied/sec is the rate at which the server is unable to accommodate requests for Raw Writes. When a write is much ...
  75. Writes Large/sec is the rate at which writes are made by applications that are over 2 times the server's negotiated buffer ...