Windows Server 2008
- If you're using removable media and the transfer requires more than one CD, DVD, USB drive, or external drive, make sure ...
- If you've created a previous IEAK package in this location, the settings from that package will be the default settings for ...
- If your AD RMS-enabled application uses extended rights values, provide the rights definitions here. In the Name box, type ...
- If your computer meets all of the client requirements but you do not see any programs listed, contact your systems administrator ...
- If your document looks similar to the example on the left, the print cartridges need to be cleaned. This takes about 2 minutes ...
- If your game controller is not functioning properly on the Test page, it may need to be calibrated. Click Calibrate and follow ...
- If your hardware came with an installation CD, it is recommended that you click Cancel to close this wizard and use the manufacturer's ...
- If your Internet service is provided through a cable modem, a DSL modem, or a similar broadband device, it is likely that ...
- If your Internet service is provided through a cable modem, a DSL modem, or a similar broadband device, it is likely that ...
- If your network has both a NAT server and multiple private interfaces, you should configure DHCP on all private segments. ...
- If your other computer is running Windows Vista, you can plug in the cable. If not, complete these steps. 1. On your old ...
- If your phone company provided only one phone number and SPID for each ISDN line, select channel 1 for that line, and type ...
- If your phone company provided only one phone number for each ISDN line, select channel 1 for that line, and type the phone ...
- If your phone company provided only one subaddress and phone number for each ISDN line, select logical terminal 1 for that ...
- If your RADIUS clients (authenticating switches and wireless access points) support VLANs, you can configure NPS to supply ...
- If your RADIUS clients (authenticating switches and wireless access points) support VLANs, you can configure NPS to supply ...
- If your remote access server is Microsoft Routing and Remote Access, you can define the filters to apply during this connection. ...
- If your user names and passwords are lost, damaged, or destroyed then you can use this backup to restore them. You can also ...
- If your users will need to sign up for your service, two options are available to you: server-based and server-less signup. ...
- IGMP could not schedule a task to be executed. This may have been caused by a memory allocation failure. The data is the ...
- IGMP discarded a version %1 packet received on the interface with IP address %2 from a neighbor with IP address %3. The above ...
- IGMP Interface Configuration Information for %1!s! - Version : 2!x! IGMP Protocol Type : %3!s! Interface Enabled Flag : %4!s! ...
- IGMP Interface Configuration Information for %1!s! - Version : 2!x! IGMP Router Type : %3!s! Interface Enabled Flag : %4!s! ...
- IGMP Interface Configuration Information for %1!s! - Version : 2!x! IGMP Router Type : %3!s! Interface Enabled Flag : %4!s! ...
- IGMP received a packet which was smaller than the minimum size allowed for IGMP packets. The packet has been discarded. It ...
- IGMP received a packet with an invalid header. The packet has been discarded. It was received on the local interface with ...
- IGMP received a packet with an invalid version in its header. The packet has been discarded. It was received on the local ...
- IGMP Statistics for %1!s! Interface - Interface name %2!s! IP Address %3!s! Type %4!s! Interface State %5!s! Querier State ...
- IGMP Statistics for Proxy Interface - Interface name %1!s! IP Address %2!s! Type %3!s! State %4!s! Current Group Memberships ...
- Igmpv2 detected an error on the local interface with IP address %1. The error occurred while the interface was receiving ...
- Igmpv2 was unable to request notification of events on the socket for the local interface with IP address %1. The data is ...
- IIS 6 Management Compatibility provides forward compatibility for your applications and scripts that use the two IIS APIs, ...
- IIS 6 Metabase Compatibility provides infrastructure to query and configure the metabase so that you can run applications ...
- IIS 6 Scripting Tools provide the ability to continue using IIS 6 scripting tools that you built to manage IIS 6 in IIS 7, ...
- IIS 6 WMI Compatibility provides Windows Management Instrumentation (WMI) scripting interfaces to programmatically manage ...
- IIS App-Pools could not be retrieved. Either the system does not have IIS installed or the connection to the machine failed ...
- IIS Client Certificate Mapping Authentication uses client certificates to authenticate users. A client certificate is a digital ...
- IIS Management Console provides infrastructure to manage IIS 7 by using a user interface. You can use the IIS management ...
- IIS Management Scripts and Tools provide infrastructure to programmatically manage an IIS 7 Web server by using commands ...
- IIS7 includes advances in diagnosing and troubleshooting Web applications. IIS supports buffering trace events for a given ...
- IKE failed to find valid machine certificate. Contact your Network Security Administrator about installing a valid certificate ...
- IKE Main Mode Negotiation Time is the number of milliseconds taken for the last IKE Main Mode security association negotiated. ...
- IKE negotiation failed because the machine certificate used does not have a private key. IPsec certificates require a private ...
- IKE Quick Mode Negotiation Time is the number of milliseconds taken for the last IKE Quick Mode security association negotiated. ...
- IKE security association establishment failed because peer could not authenticate. The certificate trust could not be established. ...
- IKE security association establishment failed because peer sent invalid proposal. Mode: %1 Filter: %2 Attribute: %3 Expected ...
- IKE security association negotiation failed. Mode: %1 Filter: %2 Peer Identity: %3 Failure Point: %4 Failure Reason: %5 Extra ...
- Illegal network control block (NCB) buffer length on SEND DATAGRAM, SEND BROADCAST, ADAPTER STATUS, or SESSION STATUS. The ...
- Illegal System DLL Relocation} The system DLL %hs was relocated in memory. The application will not run properly. The relocation ...
- Image File with the same name already exists. Do you want to append to the existing file? Click Yes to append, No to overwrite ...
- Image Relocated} An image file could not be mapped at the address specified in the image file. Local fixups must be performed ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the selected image with this protection. Executable memory is memory that ...
- Image Space is the virtual address space in use by the selected image with this protection. Execute Write Copy is memory ...
- Image Space is the virtual address space in use by the selected image with this protection. Execute/Read Only memory is memory ...
- Image Space is the virtual address space in use by the selected image with this protection. Execute/Read/Write memory is ...
- Image Space is the virtual address space in use by the selected image with this protection. No Access protection prevents ...
- Image Space is the virtual address space in use by the selected image with this protection. Read Only protection prevents ...
- Image Space is the virtual address space in use by the selected image with this protection. Read/Write protection allows ...
- Image Space is the virtual address space in use by the selected image with this protection. Write Copy protection is used ...
- Image with the same name already exists in the %s. If you choose to overwrite then all the images in the file will be lost. ...
- image`i`*`Specifies the provider image path. The matching PDB will be located in the Symbol Server. Multiple paths can be ...
- Immediate steps Because a disk failure will cause you to lose all programs, files and documents on the disk, you should back ...
- Impersonate a client after authentication Assigning this privilege to a user allows programs running on behalf of that user ...
- Import file groups from a file. The syntax of this command is: Filescrn Filegroup Import /File:PATH /Filegroup:FG_NAME | ...
- Import from backup is successful. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source GPO:%r ...
- Import from backup is successful. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source Template:%r ...
- Import from files in XML format resource allocation policies, process matching criteria, and calendar events and schedules ...