Windows Server 2008

  1. hs is a 16-bit application. You do not have permissions to execute 16-bit applications. Check your permissions with your ...
  2. HTTP Activation supports process activation via HTTP. Applications that use HTTP Activation can start and stop dynamically ...
  3. HTTP Activation supports process activation via HTTP. Applications that use HTTP Activation can start and stop dynamically ...
  4. HTTP Errors allows you to customize the error messages returned to users' browsers when the Web server detects a fault condition. ...
  5. HTTP Logging provides logging of Web site activity for this server. When a loggable event, usually an HTTP transaction, occurs, ...
  6. HTTP Redirection provides support to redirect user requests to a specific destination. Use HTTP redirection whenever you ...
  7. HTTP status 200: The server's response was not valid. The server was not following the defined protocol. Resume the job, ...
  8. HTTP status 203: The returned metadata in the entity-header is not the definitive set available from the server of origin. ...
  9. HTTP status 205: The server's response was not valid. The server was not following the defined protocol. Resume the job, ...
  10. HTTP status 301: The requested resource was assigned to a new permanent Uniform Resource Identifier (URI), and any future ...
  11. HTTP status 302: The requested resource was assigned a different Uniform Resource Identifier (URI). This change is temporary. ...
  12. HTTP status 303: The response to the request is under a different Uniform Resource Identifier (URI) and must be retrieved ...
  13. HTTP status 304: The server's response was not valid. The server was not following the defined protocol. Resume the job, ...
  14. HTTP status 402: The server's response was not valid. The server was not following the defined protocol. Resume the job, ...
  15. HTTP status 409: The request could not be completed because of a conflict with the current state of the resource. The user ...
  16. HTTP status 412: The precondition given in one or more of the request header fields evaluated to false when it was tested ...
  17. HTTP status 414: The server cannot process the request because the request Uniform Resource Identifier (URI) is longer than ...
  18. HTTP status 415: The server's response was not valid. The server was not following the defined protocol. Resume the job, ...
  19. HTTP status 449: The server's response was not valid. The server was not following the defined protocol. Resume the job, ...
  20. HTTP status 502: The server, while acting as a gateway or proxy to fulfill the request, received an invalid response from ...
  21. HTTP streaming cannot be enabled because Internet Information Services (IIS) is using port 80 for HTTP connections. For more ...
  22. Hyper-V allows you to virtualize your server workloads by running those workloads on virtual machines. You can use virtual ...
  23. Hyper-V is installed, but additional steps are required to begin running server workloads on virtual machines. Go to Hyper-V ...
  24. Hyper-V is installed, but additional steps are required to begin running server workloads on virtual machines. To add virtual ...
  25. Hyper-V provides the services that you can use to create and manage virtual machines and their resources. Each virtual machine ...
  26. I have a firewall program that I'll monitor myself Security Center won't monitor your firewall and won't send you alerts ...
  27. I have an antispyware program that I'll monitor myself Security Center won't monitor your spyware protection status and won't ...
  28. I have an antivirus program that I'll monitor myself Choose this option if your antivirus program cannot report status to ...
  29. I have an antivirus program that I'll monitor myself Security Center won't monitor your virus protection status and won't ...
  30. I have given you permission to access some of my files from any computer on this network. You can access them by clicking ...
  31. I have given you permission to access some of my files from any computer on this network. You can access them by clicking ...
  32. I need help with my computer. Would you please use Windows Remote Assistance to connect to my computer so you can help me? ...
  33. I understand that music copied from CDs is protected by law, including US and International copyright laws, and that I am ...
  34. I understand that music copied from CDs is protected by law, including US and International copyright laws, and that I am ...
  35. I want to copy files and settings to a network location, and then transfer them from the network location to my new computer. ...
  36. I want to restore my Internet security settings myself This option will highlight which Internet settings are not at their ...
  37. I want to transfer files and settings directly from the old computer to the new computer, without copying them to a network ...
  38. i!. Save this numerical recovery password in a secure location away from your computer: %2 To prevent data loss, save this ...
  39. i!. Type \"manage-bde -status\" to check if the hardware test succeeded. NOTE: Encryption will begin after the hardware test ...
  40. I'll turn on %1 myself %1 has not provided Security Center with a necessary program. Choosing this option only closes this ...
  41. I'll turn on and update %1 myself %1 has not provided Security Center with a necessary program. Choosing this option only ...
  42. I64i! bytes could not be restored because of bad clusters found on the backup image. We recommend you to rerun the recovery ...
  43. I64i! bytes could not be written to the restored volume because of the presence of bad clusters on the volume (%2). We recommend ...
  44. Iashlpr initialization failed: %1, so DHCP server cannot talk to NPS server. It could be that IAS service is not started. ...
  45. Id = %1!lu! Name = %2!s! Description = %3!s! Version = %4!s! Vendor name = %5!s! Registration date = %6!s! Initialized = ...
  46. ID Process is the unique identifier of this process. ID Process numbers are reused, so they only identify a process for the ...
  47. Id that is globally unique to each instance of each adapter. This is the value reported by the MSiSCSI_HBAInformation class. ...
  48. ID Thread is the unique identifier of this thread. ID Thread numbers are reused, so they only identify a thread for the lifetime ...
  49. Identifiers issued by a government for purposes of identifying an individual over time, such as a driver's license number, ...
  50. IDENTIFIERS Many of the Bcdedit commands require identifiers. An identifier uniquely identifies entries contained in the ...
  51. IDENTIFIERS Many of the Bcdedit commands require identifiers. An identifier uniquely identifies entries contained in the ...
  52. Identifies the available character sets for the output of text related to managing the Printer. Strings provided in this ...
  53. Identifies the available languages for strings used by the Printer for the output of management information. The strings ...
  54. Identifies the current language being used by the Printer for management. The language listed in the CurrentNaturalLanguage ...
  55. Identifies the event within the NT Eventlog logfile. This is specific to the logfile and is used together with the logfile ...
  56. Identifies the event. This is specific to the source that generated the event log entry, and is used, together with SourceName, ...
  57. Identifies the GPO that contains this Policy Object.A client-side extension obtains this value fromPGROUP_POLICY_OBJECT->lpDSPath. ...
  58. Identifies the networks to which the computer has connected, collects and stores properties for these networks, and notifies ...
  59. Identity Federation Support leverages federated trust relationships between your organization and other organizations to ...
  60. Identity Management for UNIX cannot find the computer. Verify that the computer exists on the network and is functioning ...
  61. Identity Management for UNIX cannot find the directory {0}. Verify that the path and directory names are correct, and then ...
  62. Identity Management for UNIX cannot use the specified encryption key. For more information about encryption keys, see "Encryption ...
  63. Identity Management for UNIX cannot use the specified port number. The port number must be an integer from 1 through 65535. ...
  64. Identity Mapping Setup Wizard cannot run because you are not logged in as an administrator. Log on as an administrator and ...
  65. Idle power management features on processor %1 are disabled due to a firmware problem. Check with the computer manufacturer ...
  66. Idle time is a good indicator of disk activity. Disk subsystems sustain various I/O rates and the Idle counter normalized ...
  67. If %s is found on the end-user's machine, it will be configured with the settings underlined in green in this property sheet. ...
  68. If /D was NOT specified on the command line, then when CMD.EXE starts, it looks for the following REG_SZ/REG_EXPAND_SZ registry ...
  69. If a certificate used to encrypt data using Encrypting File System (EFS) is lost, the data cannot be recovered unless a key ...
  70. If a clustered service or application is configured to use the current drive letter, changing the drive letter can cause ...
  71. If a DHCP server is running on the Windows Deployment Services server, Windows Deployment Services must be configured to ...
  72. If a driver was provided, make sure it is designed to work with Windows for 32-bit systems. If you do not have an appropriate ...
  73. If a driver was provided, make sure it is designed to work with Windows for Itanium-based systems. If you do not have an ...
  74. If a driver was provided, make sure it is designed to work with Windows for x64-based systems. If you do not have an appropriate ...
  75. If a persistent login was set up for the target, it may not have been removed. Check the iSCSI Initiator Control Panel to ...