Windows 7

  1. This change will require administrative clients to update the name used to connect to this cluster. You will also need to ...
  2. This change will require clients to update the name used to connect to this service or application. You will also need to ...
  3. This channel cannot be displayed over your DVI or HDMI connection. You can watch this channel using a different type of video ...
  4. This channel includes content for display by the Channel Screen Saver. Would you like to replace your current screen saver ...
  5. This channel is password-protected. You will not be able to synchronize this channel without a username and password. If ...
  6. This channel is unavailable because of a limit to the number of tuners you can use. Verify you are using only as many tuners ...
  7. This channel requires a user name and password before you can download its content. You should have received this information ...
  8. This checkbox only applies when you are connected to a local network and a dial-up network simultaneously. When checked, ...
  9. This class contains the .INI information that the application needs to set in an .INI file. The .INI file information is ...
  10. This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
  11. This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
  12. This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
  13. This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
  14. This class exposes attribute information associated with a fibre channel adapter. There should be one instance of this class ...
  15. This class exposes attribute information associated with a Fibre Channel port. There should be one instance of this class ...
  16. This class exposes FC3 Management information associated with a fibre channel adapter. There should be one instance of this ...
  17. This class exposes operations associated with FCP on a Fibre Channel adapter. There should be one instance of this class ...
  18. This class exposes operations that can be performed on a Fibre Channel port. There should be one instance of this class for ...
  19. This class exposes port discovery operations that can be by a fibre channel adapter. There should be one instance of this ...
  20. This class exposes port information operations that can be determined from the adapter. There should be one instance of this ...
  21. This class exposes statistical information associated with a Fibre Channel port. There should be one instance of this class ...
  22. This class extends LogicalElement to abstract the concept of an element that is enabled and disabled, such as a LogicalDevice ...
  23. This class is a representation of logical properties of a generic power source. Any logical device that has an aspect of ...
  24. This class provides access to ID table records. The ID table has a record for each file and folder known to the DFS Replication ...
  25. This class provides details about the files and folders that were moved to the Conflict and Deleted folder due to conflicting ...
  26. This class provides statistical and operational information for active sync sessions between the local replication group ...
  27. This class provides statistical and operational information for each incoming and outgoing connection of the local replication ...
  28. This class provides statistical and operational information for each replication group member hosted on the local computer. ...
  29. This class provides statistical and operational information for each volume that contains (or contained) replicated folders. ...
  30. This class represents a rule for how TCP/IP traffic is handled. The provider will only return the instances for this class ...
  31. This class represents a rule for how TCP/IP traffic is handled. The provider will only return the instances for this class ...
  32. This class represents an association between a managed system element collection and the class representing statistical information ...
  33. This class represents the association between an operating system and the autochk settings that apply to the disks on the ...
  34. This class represents the directory layout for the product. Each instance of the class represents a directory in both the ...
  35. This class represents the settings for the autochk operation for a disk. The setting applies to all disks on the computer ...
  36. This class specifies information needed to check a particular setting file for a specific entry that contains a value that ...
  37. This class specifies the information to be used to modify a particular setting file for a specific entry with a specific ...
  38. This class supplies additional information about a data provider. Querying this class with an instance name returned from ...
  39. This cluster cannot be destroyed. It has non-core application groups which must be deleted before the cluster can be destroyed. ...
  40. This cluster node has lost all network connectivity. It cannot participate in the cluster until connectivity is restored. ...
  41. This cluster node has no network connectivity. It cannot participate in the cluster until connectivity is restored. Run the ...
  42. This cluster node is running with a different message security level ('%1') than remote node '%3' ('%2'). These two nodes ...
  43. This clustered instance contains none or more than one virtual machine. To perform a live migration, the clustered instance ...
  44. This cmdlet requires Administrator permissions. Open Windows PowerShell with administrator privilege, and then try again. ...
  45. This cmdlet supports the common parameters: Verbose, Debug, ErrorAction, ErrorVariable, WarningAction, WarningVariable, OutBuffer ...
  46. This collection includes the Random, Swirl, Warp, Anon, Falloff, Water, Bubble, Dizzy, Windmill, Niagara, Blender, X Marks ...
  47. This color profile is a system default profile. It is also a read-only file. Are you sure you want to remove it from the ...
  48. This column is a list of names of services or load ordering groups that the system must start before this service. Names ...
  49. This column specifies the action taken by the startup program if the service fails to start during startup. One of the following ...
  50. This COM name is being used by another device (such as another com port or modem). Using duplicate names can lead to inaccessible ...
  51. This combination of IP address and port number is already in use. The virtual server will not start if the combination is ...
  52. This command activates or deactivates the TPM. This command requires physical presence at the computer and cannot be run ...
  53. This command allows an admin to view or modify the password replication policy for RODCs. /prp ADDITIONAL_ARGS can be either ...
  54. This command allows an entity with knowledge of the migration authorization ticket (as generated by TPM_CMK_CreateTicket) ...
  55. This command allows an entity with knowledge of the migration authorization ticket of a key (as created with TPM_CMK_CreateTicket) ...
  56. This command allows an owner of a loaded key to obtain the public key value of that key. The loaded key is created using ...
  57. This command allows or disallows the ability to set an owner. This command requires physical presence at the computer and ...
  58. This command allows software to protect secrets so that they are released only if a specified computer configuration is validated. ...
  59. This command allows the operator of the computer to deactivate the TPM until the next computer restart. The operator must ...
  60. This command allows the owner of the counter to release the specified counter. This command stops all subsequent reads or ...
  61. This command allows the TPM owner to change the TPM owner authorization value or the storage root key (SRK) authorization ...
  62. This command allows the TPM owner to clear the TPM. This means that the only key remaining on the TPM is the endorsement ...
  63. This command allows the TPM owner to create a maintenance archive that enables the migration of data held by the TPM. This ...
  64. This command allows the TPM owner to create a migration authorization ticket so that users can move keys without involvement ...
  65. This command allows the TPM owner to create a new monotonic counter, assign an authorization value to that counter, increment ...
  66. This command allows the TPM owner to create a signature verification ticket using a provided public key. This ticket is used ...
  67. This command allows the TPM owner to create an authorization ticket for one or more migration authorities so that users can ...
  68. This command allows the TPM owner to define space for an area of non-volatile storage on the TPM. This definition includes ...
  69. This command allows the TPM owner to enable or disable the TPM. See the descriptions for the TPM_PhysicalEnable and TPM_PhysicalDisable ...
  70. This command allows the TPM owner to establish the Direct Anonymous Attestation (DAA) parameters in the TPM for a specific ...
  71. This command allows the TPM owner to generate an Attestation Identity Key (AIK) that can be used to sign information generated ...
  72. This command allows the TPM owner to load a maintenance archive (generated by TPM_CreateMaintenanceArchive). When loaded, ...
  73. This command allows the TPM owner to load a row of a delegation tables into the TPM's non-volatile storage. This command ...
  74. This command allows the TPM owner to manage delegation family tables. Run this command at least once before running delegation ...
  75. This command allows the TPM owner to permanently disable the TPM_OwnerClear command. Once used, the owner must run the TPM_ForceClear ...