Windows Server 2008

  1. Brings selected online disk to the offline state. Syntax: OFFLINE DISK NOERR NOERR For scripting only. When an error is encountered, ...
  2. Browse categorization schemes, select a category, and then search for services, providers, or tModels defined by that category. ...
  3. Browser customizations are always honored during an Internet Explorer upgrade. If Internet Explorer was using Enhanced Security ...
  4. BSS type not allowed - The connection mode setting (any network, infrastructure or ad hoc only) doesn't match the requirements ...
  5. Buffer returns the requested Descriptor information. If the Descriptor does not exist, the contents of the Buffer are undefined. ...
  6. Build stacks of cards by arranging them in sequence from high number to low, in alternating suit colors red and black. Click ...
  7. Build stacks of cards by arranging them in sequence from King to Ace in the same suit. Stacks are removed when complete. ...
  8. By choosing to send your search queries to Microsoft, you can help improve search results. Information that is collected ...
  9. By choosing to send your search queries to Microsoft, you can help improve search results. We use the information to add ...
  10. By clicking the Import button, you can import the search providers from Internet Explorer 7 and add them to this list. You ...
  11. By configuring Routing and Remote Access to act as a remote access server, you can connect remote or mobile workers to your ...
  12. By default, an Active Directory forest includes one domain. If necessary, you can deploy an additional domain to isolate ...
  13. By default, clients can receive security updates from Microsoft Update. If additional sources are required for your deployment, ...
  14. By default, connections to wireless networks from your computer can be accessed by anyone with a user account on the computer ...
  15. By default, DNS uses the parent domain name when creating a Mail Exchange record. You can specify a host or child name, but ...
  16. By default, each instance of AD LDS running on an AD LDS server stores its database file and the associated log files in ...
  17. By default, only share permissions are set on this folder. To control local access permissions to this folder or objects ...
  18. By default, Room Calibration assumes a directional microphone with unspecified frequency response. Check the box below if ...
  19. By default, snap-ins are added under the console root node. Selecting this check box enables you to choose the parent snap-in ...
  20. By default, Terminal Services clients connect to network resources remotely through TCP port 3389, the port used for Remote ...
  21. By default, Terminal Services clients connect to network resources remotely through TCP port 3389. Specify whether to use ...
  22. By default, Terminal Services sessions use native Remote Desktop Protocol (RDP) encryption. However, RDP does not provide ...
  23. By default, the UDDI Services database and log files are installed on the system drive. However, you can choose to install ...
  24. By default, Windows Firewall blocks all unsolicited incoming TCP/IP traffic. To remotely manage your DHCP servers that have ...
  25. By default, you will connect to the network folder as %1. To connect as another user, enter their user name and password ...
  26. By forcing the removal of Active Directory Domain Services (AD DS), you remove AD DS from this domain controller, including ...
  27. By participating you can help us improve the quality and relevance of your Help experience. It is anonymous and we will not ...
  28. By resetting ADFS URL to empty, the default Rights Account Certification (RAC) URL will be used for ADFS trust. The current ...
  29. By saving the .INS file and .CAB files, you can use them for Automatic Configuration. The URL specified below will be entered ...
  30. By selecting Face Up], your job may take longer to print out and many of the finishing options supported by this device may ...
  31. By selecting this option you can save your credentials so that they can be used in the future when connecting to these programs. ...
  32. By unchecking this box, Windows will not control wired LAN. Consequently no wired LAN connection and security settings will ...
  33. By unchecking this box, Windows will not control wireless LAN. Consequently no wireless LAN connection and security settings ...
  34. By using a forwarder, you can manage name resolution for names that are outside of your network, such as names on the Internet ...
  35. By using TS RemoteApp together with TS Gateway, you can enable users to connect from the Internet to individual programs ...
  36. Bypass traverse checking This user right determines which users can traverse directory trees even though the user may not ...
  37. bytes could not be read due to the presence of bad clusters on your hard disk(s). Data on the bad clusters have not been ...
  38. bytes could not be restored because of bad clusters on the backup image. We recommend that you run the recovery again from ...
  39. bytes could not be written to the restored volume because of bad clusters on the recovered volume. We recommend that you ...
  40. Bytes Received Per Second shows an estimate of the average number of bytes that were received each second over the past 30 ...
  41. Bytes Received/sec is the rate at which bytes are received by the local computer over an NBT connection to some remote computer. ...
  42. Bytes Received/sec is the rate at which bytes are received over each network adapter, including framing characters. Network ...
  43. Bytes Received/sec is the rate of bytes coming in to the Redirector from the network. It includes all application data as ...
  44. Bytes Sent/sec is the rate at which bytes are sent by the local computer over an NBT connection to some remote computer. ...
  45. Bytes Sent/sec is the rate at which bytes are sent over each network adapter, including framing characters. Network Interface\Bytes ...
  46. Bytes Total/sec is the rate at which bytes are sent and received over each network adapter, including framing characters. ...
  47. Bytes Total/sec is the rate at which bytes are sent or received by the local computer over an NBT connection to some remote ...
  48. Bytes Total/sec is the rate the Redirector is processing data bytes. This includes all application and file data in addition ...
  49. Bytes Total/sec is the total rate of bytes sent to or received from the network by the protocol, but only for the frames ...
  50. Bytes Transmitted/sec is the rate at which bytes are leaving the Redirector to the network. It includes all application data ...
  51. C1 Time is the percentage of time the processor spends in the C1 low-power idle state. % C1 Time is a subset of the total ...
  52. C1 Transitions/sec is the rate that the CPU enters the C1 low-power idle state. The CPU enters the C1 state when it is sufficiently ...
  53. C2 Time is the percentage of time the processor spends in the C2 low-power idle state. % C2 Time is a subset of the total ...
  54. C2 Transitions/sec is the rate that the CPU enters the C2 low-power idle state. The CPU enters the C2 state when it is sufficiently ...
  55. C3 Time is the percentage of time the processor spends in the C3 low-power idle state. % C3 Time is a subset of the total ...
  56. C3 Transitions/sec is the rate that the CPU enters the C3 low-power idle state. The CPU enters the C3 state when it is sufficiently ...
  57. C:\WINDOWS> dir Directory of C:\WINDOWS SYSTEM 03-01-95 WIN COM 22,087 03-01-95 WIN INI 11,728 03-01-95 WELCOME EXE 19,539 ...
  58. CableManagementStrategy is a free-form string that contains information on how the various cables are connected and bundled ...
  59. Cables and links utilize physical connectors to actually 'connect' physical elements. This association explicitly defines ...
  60. Cache Bytes is the sum of the Memory\System Cache Resident Bytes, Memory\System Driver Resident Bytes, Memory\System Code ...
  61. Cache Bytes Peak is the maximum number of bytes used by the file system cache since the system was last restarted. This might ...
  62. Cache Faults/sec is the rate at which faults occur when a page sought in the file system cache is not found and must be retrieved ...
  63. Cache Stats: - Checks where cache exceeded limit = %1!10lu! Successful cache enforcement passes = %2!10lu! Failed cache enforcement ...
  64. Calibration sends test tones to your speakers, and analyzes those tones using a microphone. The results of this analysis ...
  65. Calls one batch program from another. CALL drive:][path]filename batch-parameters batch-parameters Specifies any command-line ...
  66. Can be used to determine which changes have not yet been replicated between two replication partners or track statistics ...
  67. Can not update the drive configuration of drive %1 in library %2 because another process has the drive open. Setting drive ...
  68. Can sustain failures of all nodes except 1. Cannot sustain a failure of the quorum disk. This configuration is not recommended ...
  69. Can sustain failures of {0} node(s) if the witness file share remains available. Can sustain failures of {1} node(s) if the ...
  70. Can sustain failures of {0} node(s) with the witness disk online. Can sustain failures of {1} node(s) if the witness disk ...
  71. Can you help us fill orders? Look at the cake on the TV and make a batch of cakes just like that. Work fast because the cake ...
  72. Can you help us fill orders? We are way behind schedule! Look at the cakes that appear on the TV and make matching cakes. ...
  73. Can't change this setting because you must first select the "Index this folder for faster searching" setting in Folder Properties ...
  74. Can't connect to the interrupt provided by the system. Please try to change the 'Interrupt Request' setting in Device Manager. ...
  75. Can't determine the age of the cross-ref %1 for the partition %2, so following errors relating to this cross-ref/partition ...