Windows Server 2008
- Brings selected online disk to the offline state. Syntax: OFFLINE DISK NOERR NOERR For scripting only. When an error is encountered, ...
- Browse categorization schemes, select a category, and then search for services, providers, or tModels defined by that category. ...
- Browser customizations are always honored during an Internet Explorer upgrade. If Internet Explorer was using Enhanced Security ...
- BSS type not allowed - The connection mode setting (any network, infrastructure or ad hoc only) doesn't match the requirements ...
- Buffer returns the requested Descriptor information. If the Descriptor does not exist, the contents of the Buffer are undefined. ...
- Build stacks of cards by arranging them in sequence from high number to low, in alternating suit colors red and black. Click ...
- Build stacks of cards by arranging them in sequence from King to Ace in the same suit. Stacks are removed when complete. ...
- By choosing to send your search queries to Microsoft, you can help improve search results. Information that is collected ...
- By choosing to send your search queries to Microsoft, you can help improve search results. We use the information to add ...
- By clicking the Import button, you can import the search providers from Internet Explorer 7 and add them to this list. You ...
- By configuring Routing and Remote Access to act as a remote access server, you can connect remote or mobile workers to your ...
- By default, an Active Directory forest includes one domain. If necessary, you can deploy an additional domain to isolate ...
- By default, clients can receive security updates from Microsoft Update. If additional sources are required for your deployment, ...
- By default, connections to wireless networks from your computer can be accessed by anyone with a user account on the computer ...
- By default, DNS uses the parent domain name when creating a Mail Exchange record. You can specify a host or child name, but ...
- By default, each instance of AD LDS running on an AD LDS server stores its database file and the associated log files in ...
- By default, only share permissions are set on this folder. To control local access permissions to this folder or objects ...
- By default, Room Calibration assumes a directional microphone with unspecified frequency response. Check the box below if ...
- By default, snap-ins are added under the console root node. Selecting this check box enables you to choose the parent snap-in ...
- By default, Terminal Services clients connect to network resources remotely through TCP port 3389, the port used for Remote ...
- By default, Terminal Services clients connect to network resources remotely through TCP port 3389. Specify whether to use ...
- By default, Terminal Services sessions use native Remote Desktop Protocol (RDP) encryption. However, RDP does not provide ...
- By default, the UDDI Services database and log files are installed on the system drive. However, you can choose to install ...
- By default, Windows Firewall blocks all unsolicited incoming TCP/IP traffic. To remotely manage your DHCP servers that have ...
- By default, you will connect to the network folder as %1. To connect as another user, enter their user name and password ...
- By forcing the removal of Active Directory Domain Services (AD DS), you remove AD DS from this domain controller, including ...
- By participating you can help us improve the quality and relevance of your Help experience. It is anonymous and we will not ...
- By resetting ADFS URL to empty, the default Rights Account Certification (RAC) URL will be used for ADFS trust. The current ...
- By saving the .INS file and .CAB files, you can use them for Automatic Configuration. The URL specified below will be entered ...
- By selecting Face Up], your job may take longer to print out and many of the finishing options supported by this device may ...
- By selecting this option you can save your credentials so that they can be used in the future when connecting to these programs. ...
- By unchecking this box, Windows will not control wired LAN. Consequently no wired LAN connection and security settings will ...
- By unchecking this box, Windows will not control wireless LAN. Consequently no wireless LAN connection and security settings ...
- By using a forwarder, you can manage name resolution for names that are outside of your network, such as names on the Internet ...
- By using TS RemoteApp together with TS Gateway, you can enable users to connect from the Internet to individual programs ...
- Bypass traverse checking This user right determines which users can traverse directory trees even though the user may not ...
- bytes could not be read due to the presence of bad clusters on your hard disk(s). Data on the bad clusters have not been ...
- bytes could not be restored because of bad clusters on the backup image. We recommend that you run the recovery again from ...
- bytes could not be written to the restored volume because of bad clusters on the recovered volume. We recommend that you ...
- Bytes Received Per Second shows an estimate of the average number of bytes that were received each second over the past 30 ...
- Bytes Received/sec is the rate at which bytes are received by the local computer over an NBT connection to some remote computer. ...
- Bytes Received/sec is the rate at which bytes are received over each network adapter, including framing characters. Network ...
- Bytes Received/sec is the rate of bytes coming in to the Redirector from the network. It includes all application data as ...
- Bytes Sent/sec is the rate at which bytes are sent by the local computer over an NBT connection to some remote computer. ...
- Bytes Sent/sec is the rate at which bytes are sent over each network adapter, including framing characters. Network Interface\Bytes ...
- Bytes Total/sec is the rate at which bytes are sent and received over each network adapter, including framing characters. ...
- Bytes Total/sec is the rate at which bytes are sent or received by the local computer over an NBT connection to some remote ...
- Bytes Total/sec is the rate the Redirector is processing data bytes. This includes all application and file data in addition ...
- Bytes Total/sec is the total rate of bytes sent to or received from the network by the protocol, but only for the frames ...
- Bytes Transmitted/sec is the rate at which bytes are leaving the Redirector to the network. It includes all application data ...
- C1 Time is the percentage of time the processor spends in the C1 low-power idle state. % C1 Time is a subset of the total ...
- C1 Transitions/sec is the rate that the CPU enters the C1 low-power idle state. The CPU enters the C1 state when it is sufficiently ...
- C2 Time is the percentage of time the processor spends in the C2 low-power idle state. % C2 Time is a subset of the total ...
- C2 Transitions/sec is the rate that the CPU enters the C2 low-power idle state. The CPU enters the C2 state when it is sufficiently ...
- C3 Time is the percentage of time the processor spends in the C3 low-power idle state. % C3 Time is a subset of the total ...
- C3 Transitions/sec is the rate that the CPU enters the C3 low-power idle state. The CPU enters the C3 state when it is sufficiently ...
- C:\WINDOWS> dir Directory of C:\WINDOWS SYSTEM 03-01-95 WIN COM 22,087 03-01-95 WIN INI 11,728 03-01-95 WELCOME EXE 19,539 ...
- CableManagementStrategy is a free-form string that contains information on how the various cables are connected and bundled ...
- Cables and links utilize physical connectors to actually 'connect' physical elements. This association explicitly defines ...
- Cache Bytes is the sum of the Memory\System Cache Resident Bytes, Memory\System Driver Resident Bytes, Memory\System Code ...
- Cache Bytes Peak is the maximum number of bytes used by the file system cache since the system was last restarted. This might ...
- Cache Faults/sec is the rate at which faults occur when a page sought in the file system cache is not found and must be retrieved ...
- Cache Stats: - Checks where cache exceeded limit = %1!10lu! Successful cache enforcement passes = %2!10lu! Failed cache enforcement ...
- Calibration sends test tones to your speakers, and analyzes those tones using a microphone. The results of this analysis ...
- Calls one batch program from another. CALL drive:][path]filename batch-parameters batch-parameters Specifies any command-line ...
- Can be used to determine which changes have not yet been replicated between two replication partners or track statistics ...
- Can not update the drive configuration of drive %1 in library %2 because another process has the drive open. Setting drive ...
- Can sustain failures of all nodes except 1. Cannot sustain a failure of the quorum disk. This configuration is not recommended ...
- Can sustain failures of {0} node(s) if the witness file share remains available. Can sustain failures of {1} node(s) if the ...
- Can sustain failures of {0} node(s) with the witness disk online. Can sustain failures of {1} node(s) if the witness disk ...
- Can you help us fill orders? Look at the cake on the TV and make a batch of cakes just like that. Work fast because the cake ...
- Can you help us fill orders? We are way behind schedule! Look at the cakes that appear on the TV and make matching cakes. ...
- Can't change this setting because you must first select the "Index this folder for faster searching" setting in Folder Properties ...
- Can't connect to the interrupt provided by the system. Please try to change the 'Interrupt Request' setting in Device Manager. ...
- Can't determine the age of the cross-ref %1 for the partition %2, so following errors relating to this cross-ref/partition ...