Windows Server 2008
- hs is a 16-bit application. You do not have permissions to execute 16-bit applications. Check your permissions with your ...
- HTTP Activation supports process activation via HTTP. Applications that use HTTP Activation can start and stop dynamically ...
- HTTP Activation supports process activation via HTTP. Applications that use HTTP Activation can start and stop dynamically ...
- HTTP Errors allows you to customize the error messages returned to users' browsers when the Web server detects a fault condition. ...
- HTTP Logging provides logging of Web site activity for this server. When a loggable event, usually an HTTP transaction, occurs, ...
- HTTP Redirection provides support to redirect user requests to a specific destination. Use HTTP redirection whenever you ...
- HTTP status 200: The server's response was not valid. The server was not following the defined protocol. Resume the job, ...
- HTTP status 203: The returned metadata in the entity-header is not the definitive set available from the server of origin. ...
- HTTP status 205: The server's response was not valid. The server was not following the defined protocol. Resume the job, ...
- HTTP status 301: The requested resource was assigned to a new permanent Uniform Resource Identifier (URI), and any future ...
- HTTP status 302: The requested resource was assigned a different Uniform Resource Identifier (URI). This change is temporary. ...
- HTTP status 303: The response to the request is under a different Uniform Resource Identifier (URI) and must be retrieved ...
- HTTP status 304: The server's response was not valid. The server was not following the defined protocol. Resume the job, ...
- HTTP status 402: The server's response was not valid. The server was not following the defined protocol. Resume the job, ...
- HTTP status 409: The request could not be completed because of a conflict with the current state of the resource. The user ...
- HTTP status 412: The precondition given in one or more of the request header fields evaluated to false when it was tested ...
- HTTP status 414: The server cannot process the request because the request Uniform Resource Identifier (URI) is longer than ...
- HTTP status 415: The server's response was not valid. The server was not following the defined protocol. Resume the job, ...
- HTTP status 449: The server's response was not valid. The server was not following the defined protocol. Resume the job, ...
- HTTP status 502: The server, while acting as a gateway or proxy to fulfill the request, received an invalid response from ...
- HTTP streaming cannot be enabled because Internet Information Services (IIS) is using port 80 for HTTP connections. For more ...
- Hyper-V allows you to virtualize your server workloads by running those workloads on virtual machines. You can use virtual ...
- Hyper-V is installed, but additional steps are required to begin running server workloads on virtual machines. Go to Hyper-V ...
- Hyper-V is installed, but additional steps are required to begin running server workloads on virtual machines. To add virtual ...
- Hyper-V provides the services that you can use to create and manage virtual machines and their resources. Each virtual machine ...
- I have a firewall program that I'll monitor myself Security Center won't monitor your firewall and won't send you alerts ...
- I have an antispyware program that I'll monitor myself Security Center won't monitor your spyware protection status and won't ...
- I have an antivirus program that I'll monitor myself Choose this option if your antivirus program cannot report status to ...
- I have an antivirus program that I'll monitor myself Security Center won't monitor your virus protection status and won't ...
- I have given you permission to access some of my files from any computer on this network. You can access them by clicking ...
- I have given you permission to access some of my files from any computer on this network. You can access them by clicking ...
- I need help with my computer. Would you please use Windows Remote Assistance to connect to my computer so you can help me? ...
- I understand that music copied from CDs is protected by law, including US and International copyright laws, and that I am ...
- I understand that music copied from CDs is protected by law, including US and International copyright laws, and that I am ...
- I want to copy files and settings to a network location, and then transfer them from the network location to my new computer. ...
- I want to restore my Internet security settings myself This option will highlight which Internet settings are not at their ...
- I want to transfer files and settings directly from the old computer to the new computer, without copying them to a network ...
- i!. Save this numerical recovery password in a secure location away from your computer: %2 To prevent data loss, save this ...
- i!. Type \"manage-bde -status\" to check if the hardware test succeeded. NOTE: Encryption will begin after the hardware test ...
- I'll turn on %1 myself %1 has not provided Security Center with a necessary program. Choosing this option only closes this ...
- I'll turn on and update %1 myself %1 has not provided Security Center with a necessary program. Choosing this option only ...
- I64i! bytes could not be restored because of bad clusters found on the backup image. We recommend you to rerun the recovery ...
- I64i! bytes could not be written to the restored volume because of the presence of bad clusters on the volume (%2). We recommend ...
- Iashlpr initialization failed: %1, so DHCP server cannot talk to NPS server. It could be that IAS service is not started. ...
- Id = %1!lu! Name = %2!s! Description = %3!s! Version = %4!s! Vendor name = %5!s! Registration date = %6!s! Initialized = ...
- ID Process is the unique identifier of this process. ID Process numbers are reused, so they only identify a process for the ...
- Id that is globally unique to each instance of each adapter. This is the value reported by the MSiSCSI_HBAInformation class. ...
- ID Thread is the unique identifier of this thread. ID Thread numbers are reused, so they only identify a thread for the lifetime ...
- Identifiers issued by a government for purposes of identifying an individual over time, such as a driver's license number, ...
- IDENTIFIERS Many of the Bcdedit commands require identifiers. An identifier uniquely identifies entries contained in the ...
- IDENTIFIERS Many of the Bcdedit commands require identifiers. An identifier uniquely identifies entries contained in the ...
- Identifies the available character sets for the output of text related to managing the Printer. Strings provided in this ...
- Identifies the available languages for strings used by the Printer for the output of management information. The strings ...
- Identifies the current language being used by the Printer for management. The language listed in the CurrentNaturalLanguage ...
- Identifies the event within the NT Eventlog logfile. This is specific to the logfile and is used together with the logfile ...
- Identifies the event. This is specific to the source that generated the event log entry, and is used, together with SourceName, ...
- Identifies the GPO that contains this Policy Object.A client-side extension obtains this value fromPGROUP_POLICY_OBJECT->lpDSPath. ...
- Identifies the networks to which the computer has connected, collects and stores properties for these networks, and notifies ...
- Identity Federation Support leverages federated trust relationships between your organization and other organizations to ...
- Identity Management for UNIX cannot find the computer. Verify that the computer exists on the network and is functioning ...
- Identity Management for UNIX cannot find the directory {0}. Verify that the path and directory names are correct, and then ...
- Identity Management for UNIX cannot use the specified encryption key. For more information about encryption keys, see "Encryption ...
- Identity Management for UNIX cannot use the specified port number. The port number must be an integer from 1 through 65535. ...
- Identity Mapping Setup Wizard cannot run because you are not logged in as an administrator. Log on as an administrator and ...
- Idle power management features on processor %1 are disabled due to a firmware problem. Check with the computer manufacturer ...
- Idle time is a good indicator of disk activity. Disk subsystems sustain various I/O rates and the Idle counter normalized ...
- If %s is found on the end-user's machine, it will be configured with the settings underlined in green in this property sheet. ...
- If /D was NOT specified on the command line, then when CMD.EXE starts, it looks for the following REG_SZ/REG_EXPAND_SZ registry ...
- If a certificate used to encrypt data using Encrypting File System (EFS) is lost, the data cannot be recovered unless a key ...
- If a clustered service or application is configured to use the current drive letter, changing the drive letter can cause ...
- If a DHCP server is running on the Windows Deployment Services server, Windows Deployment Services must be configured to ...
- If a driver was provided, make sure it is designed to work with Windows for 32-bit systems. If you do not have an appropriate ...
- If a driver was provided, make sure it is designed to work with Windows for Itanium-based systems. If you do not have an ...
- If a driver was provided, make sure it is designed to work with Windows for x64-based systems. If you do not have an appropriate ...
- If a persistent login was set up for the target, it may not have been removed. Check the iSCSI Initiator Control Panel to ...