Windows Server 2008

  1. Internal: 16-bit compatibility flag that allows us to trap divide overflow exceptions and change the dividend to a happier ...
  2. Internet Authentication Service is Microsoft's implementation of a Remote Authentication Dial-in User Service (RADIUS) server. ...
  3. Internet Connection Sharing (ICS) cannot be enabled because Routing and Remote Access has been enabled on this computer. ...
  4. Internet Connection Sharing and/or Internet Connection Firewall is currently enabled for a network connection, and must be ...
  5. Internet Connection Sharing is currently enabled for connection '%1'. It will now be enabled for connection '%2' instead. ...
  6. Internet Connection Sharing is currently enabled for connection '%1'. It will now be enabled for connection '%2' instead. ...
  7. Internet Control Message Protocol (ICMP) allows the computers on a network to share error and status information. Select ...
  8. Internet Control Message Protocol (ICMP) allows the computers on a network to share error and status information. Select ...
  9. Internet Explorer 6 lets you specify a custom Search bar URL which opens in a separate frame when the user clicks on the ...
  10. Internet Explorer Enhanced Security Configuration (IE ESC) reduces the exposure of your server to potential attacks from ...
  11. Internet Explorer Enhanced Security Configuration adjusts the security levels for the existing security zones. The following ...
  12. Internet Explorer Enhanced Security Configuration allows you to control the level of Internet Explorer access allowed to ...
  13. Internet Explorer Enhanced Security Configuration is an option that is provided in Windows Server 2003 operating systems ...
  14. Internet Explorer Enhanced Security Configuration is currently enabled on your server. This configures a number of security ...
  15. Internet Explorer Enhanced Security Configuration is designed to reduce your server's exposure to security threats. To ensure ...
  16. Internet Explorer Enhanced Security Configuration places your server and Microsoft Internet Explorer in a configuration that ...
  17. Internet Explorer has automatically configured a proxy server for this connection. Is a proxy server used on this connection? ...
  18. Internet Explorer has blocked this site from using an ActiveX control in an unsafe manner. As a result, this page may not ...
  19. Internet Explorer has determined that this is a reported phishing website. Phishing websites impersonate other sites and ...
  20. Internet Explorer maintains two different lists of sites for the Local intranet zone. One list is in effect when the enhanced ...
  21. Internet Explorer maintains two different lists of sites for the Trusted Sites zone. One list is in effect when the enhanced ...
  22. Internet Explorer needs to open a new window to display this webpage. For your computer's security, websites that are in ...
  23. Internet Explorer Setup automatically backs up the machine data for uninstall purposes. You can disable this to save disk ...
  24. Internet Explorer Setup can be customized by adding custom components, selecting the components to install, specifying download ...
  25. Internet Explorer stopped the previous page from installing an ActiveX control on your computer. Click here to go back and ...
  26. Internet Explorer was not able to open this Internet site. The requested site is either unavailable or cannot be found. Please ...
  27. Internet Explorer was unable to delete this network connection because it is currently in use. Close the connection and try ...
  28. Internet Information Services (IIS) is a full-featured Web server with a fault-tolerant process model that increases the ...
  29. Internet Information Services (IIS) is not installed on this computer. Active Directory Certificate Services Web Enrollment ...
  30. Internet management systems may request the contact person, system location, and network services for this computer from ...
  31. Internet Printing Client enables clients to use Internet Printing Protocol (IPP) to connect and print to printers on the ...
  32. Internet Printing creates a Web site where users can manage print jobs on the server. It also enables users who have Internet ...
  33. Internet Printing creates a Web site where users can manage print jobs on the server. It also enables users who have Internet ...
  34. Internet Protocol Security (IPsec) Administration. Manage IPsec policies for secure communication with other computers. Portions ...
  35. Internet Protocol security (IPsec) supports network-level peer authentication, data origin authentication, data integrity, ...
  36. Internet security settings are not set to their recommended levels. Security Center can't help restore your Internet security ...
  37. Internet Server Application Programming Interface (ISAPI) Extensions provides support for dynamic Web content developing ...
  38. Internet Server Application Programming Interface (ISAPI) Filters provides support for Web applications that use ISAPI filters. ...
  39. Internet Settings policy allows an administrator to manage settings that are available in the "Internet Options" Control ...
  40. Internet Shinchakubin 1.00 - 1.40 has a known compatibility issue with this version of Windows. For an update that is compatible ...
  41. Internet Storage Name Server (iSNS) provides discovery services for Internet Small Computer System Interface (iSCSI) storage ...
  42. Internet Storage Naming Server (iSNS) processes registration requests, de-registration requests, and queries from iSCSI devices. ...
  43. InterpretationOfFalse is a string indicating what a 'False' value from the binary sensor means. This information could be ...
  44. InterpretationOfTrue is a string indicating what a 'True' value from the Binary sensor means. This information could be displayed ...
  45. Interrupt Time is the time the processor spends receiving and servicing hardware interrupts during sample intervals. This ...
  46. Interrupts/sec is the average rate, in incidents per second, at which the processor received and serviced hardware interrupts. ...
  47. Interval in minutes for when auto-configuration will happen. A value of 0 means auto-config will only happen at browser startup ...
  48. Intranet settings are now turned off by default. Intranet settings are less secure than Internet settings. Click for options. ...
  49. Intranet settings use a less secure level than the Internet. If you only go to Internet websites, you should not turn on ...
  50. Invalid alias name. An alias should be a text string up to 255 characters in length, drawn from the alphabet (A-Z), digits ...
  51. Invalid assignment expression. The left hand side of an assignment operator needs to be something that can be assigned to ...
  52. Invalid Current Directory} The process cannot switch to the startup current directory %hs. Select OK to set current directory ...
  53. Invalid data. Failed to discover device name from device ID. Try to remove device or remove the rule and create a new one. ...
  54. Invalid data. Failed to discover device properties from device ID. Try to remove device or remove the group and create a ...
  55. Invalid default gateway address %2 was specified for network adapter %3. Some remote networks may not be reachable as a result. ...
  56. Invalid DLL Entrypoint} The dynamic link library %hs is not written correctly. The stack pointer has been left in an inconsistent ...
  57. Invalid domain name. Target domain differs only in case from existing domain. Use a different target domain name. current ...
  58. Invalid fileaccess value. Specify fileaccess option as xyz where x y and z are UNIX style chmod permissions between 0 and ...
  59. Invalid fileaccess value. Specify fileaccess option as xyz where x y and z are UNIX style chmod permissions between 0 and ...
  60. Invalid format. A binary string must contain sets of 8 digits, each digit is either 0 or 1. Each set must be separated by ...
  61. Invalid format. A decimal string must contain sets of three digits between 0 and 255. Each set must be separated by a space. ...
  62. Invalid format. A hexadecimal string must contain sets of two digits between 0 and FF. Each set must be separated by a space. ...
  63. Invalid format. An octal string must contain sets of three digits between 0 and 377. Each set must be separated by a space. ...
  64. Invalid Group Members. All the member(s) of this group do not belong to the selected NIS Domain. Please remove the users ...
  65. Invalid group. This group has group(s) or computer(s) as members. Please remove the group and computer objects before saving ...
  66. Invalid IXFR (Incremental Zone Transfer) response from master DNS server at %2 during attempted incremental transfer of zone ...
  67. Invalid namespace root specified for the report: the path {0} is not a valid directory (for example - it might be a file). ...
  68. Invalid Network Mask. In the Network Mask, every bit that is set (a value of one) belongs to the Network ID and every bit ...
  69. Invalid number. 'Paper Size' and 'Print Area Margins' should all be positive numbers defining a valid paper size and valid ...
  70. Invalid option combination. Specify one of '-k' '-m' '-s' 'config' 'start' 'stop' 'pause' 'continue'. For detailed help type ...
  71. Invalid or non-existent FSRM file group '{0}' specified in the filter expression. This specific file group will be ignored ...
  72. Invalid or non-existent user name '{0}' specified in the filter expression. This specific user name will be ignored in the ...
  73. Invalid partition reference in Extended Attribute ICB entry. Deleting Extended Attribute ICB entry pointing to ICB at block ...
  74. Invalid partition reference in Stream Directory ICB entry. Deleting Stream Directory ICB entry pointing to ICB at block %2 ...
  75. Invalid protector type '%1'. Valid protector types: RecoveryPassword, ExternalKey, TPM, TPMAndStartupKey, TPMAndPIN, TPMAndPinAndStartupKey. ...