Windows 8
- If you want your changes to persist across restarts please go to the initial step of the wizard and select Create standard ...
- If you would like to specify additional information for your AD RMS-enabled application, you can specify them here as name-value ...
- If you would like to use this device again then you will need to enable it. Click next to enable this device, or click Cancel ...
- If you're connected to a hotspot or domain network, contact the network administrator. Otherwise: 1. Unplug or turn off the ...
- If you're connected to a hotspot or domain network, contact the network administrator. Otherwise: 1. Unplug or turn off the ...
- If you're in an area where you'd expect to find this network, it's probably safe to connect. Otherwise, this might be a different ...
- If you're prompted to run the Remote Desktop Services ActiveX Client control when you access RD Web Access, do either of ...
- If you're running Windows on an ARM-based PC, you can only transfer items using an external hard disk or USB flash drive. ...
- If you're running Windows Server 2003 or Windows XP, and you're prompted to run the Remote Desktop Services ActiveX Client ...
- If you're running Windows Server 2008 or Windows Vista, click the warning message on the Internet Explorer Information bar, ...
- If you're running Windows Server 2008 R2 or Windows 7, in addition to the above steps, you can choose to allow the ActiveX ...
- If you're setting up BitLocker on a new drive or a new PC, you only need to encrypt the part of the drive that's currently ...
- If you're unable to select an option above, installing the drivers for the disks you are restoring to might solve the problem. ...
- If you've selected only some of your optimized files/folders residing on a Deduplication enabled volume for backup, Windows ...
- If your AD RMS-enabled application uses extended rights values, provide the rights definitions here. In the Name box, type ...
- If your backups contain full volumes, you can manage future performance by choosing one of the following settings. If the ...
- If your hardware came with an installation CD, it is recommended that you click Cancel to close this wizard and use the manufacturer's ...
- If your Internet service is provided through a cable modem, a DSL modem, or a similar broadband device, it is likely that ...
- If your network has both a NAT server and multiple private interfaces, you should configure DHCP on all private segments. ...
- If your phone company provided only one phone number and SPID for each ISDN line, select channel 1 for that line, and type ...
- If your phone company provided only one phone number for each ISDN line, select channel 1 for that line, and type the phone ...
- If your phone company provided only one subaddress and phone number for each ISDN line, select logical terminal 1 for that ...
- If your RADIUS clients (authenticating switches or wireless access points) support the assignment of traffic controls using ...
- If your RADIUS clients (authenticating switches or wireless access points) support the assignment of traffic controls using ...
- If your remote access server is Microsoft Routing and Remote Access, you can define the filters to apply during this connection. ...
- If your user names and passwords are lost, damaged, or destroyed then you can use this backup to restore them. You can also ...
- IGMP could not schedule a task to be executed. This may have been caused by a memory allocation failure. The data is the ...
- IGMP discarded a version %1 packet received on the interface with IP address %2 from a neighbor with IP address %3. The above ...
- IGMP Interface Configuration Information for %1!s! - Version : 2!x! IGMP Protocol Type : %3!s! Interface Enabled Flag : %4!s! ...
- IGMP Interface Configuration Information for %1!s! - Version : 2!x! IGMP Router Type : %3!s! Interface Enabled Flag : %4!s! ...
- IGMP Interface Configuration Information for %1!s! - Version : 2!x! IGMP Router Type : %3!s! Interface Enabled Flag : %4!s! ...
- IGMP received a packet which was smaller than the minimum size allowed for IGMP packets. The packet has been discarded. It ...
- IGMP received a packet with an invalid header. The packet has been discarded. It was received on the local interface with ...
- IGMP received a packet with an invalid version in its header. The packet has been discarded. It was received on the local ...
- IGMP Statistics for %1!s! Interface - Interface name %2!s! IP Address %3!s! Type %4!s! Interface State %5!s! Querier State ...
- IGMP Statistics for Proxy Interface - Interface name %1!s! IP Address %2!s! Type %3!s! State %4!s! Current Group Memberships ...
- IGMP was unable to send a packet from the interface with IP address %1 to the IP address %2. The data is the error code. ...
- Igmpv2 detected an error on the local interface with IP address %1. The error occurred while the interface was receiving ...
- Igmpv2 was unable to request notification of events on the socket for the local interface with IP address %1. The data is ...
- IIS App-Pools could not be retrieved. Either the system does not have IIS installed or the connection to the machine failed ...
- IKE failed to find valid machine certificate. Contact your Network Security Administrator about installing a valid certificate ...
- IKE negotiation failed because the machine certificate used does not have a private key. IPsec certificates require a private ...
- IKE security association establishment failed because peer could not authenticate. The certificate trust could not be established. ...
- IKE security association establishment failed because peer sent invalid proposal. Mode: %1 Filter: %2 Attribute: %3 Expected ...
- IKE security association negotiation failed. Mode: %1 Filter: %2 Peer Identity: %3 Failure Point: %4 Failure Reason: %5 Extra ...
- IKEv1 Main Mode Negotiation Time is the number of milliseconds taken for the last IKEv1 main mode security association negotiated. ...
- IKEv1 Quick Mode Negotiation Time is the number of milliseconds taken for the last IKEv1 quick mode security association ...
- IKEv2 Main Mode Negotiation Time is the number of milliseconds taken for the last IKEv2 main mode security association negotiated. ...
- IKEv2 Quick Mode Negotiation Time is the number of milliseconds taken for the last IKEv2 quick mode security association ...
- Illegal network control block (NCB) buffer length on SEND DATAGRAM, SEND BROADCAST, ADAPTER STATUS, or SESSION STATUS. The ...
- Illegal System DLL Relocation} The system DLL %hs was relocated in memory. The application will not run properly. The relocation ...
- Illegal System DLL Relocation} The system DLL %hs was relocated in memory. The application will not run properly. The relocation ...
- Image apply for job {2} in project {3} on computer {0} at location {1} is taking a long time. Make sure the test computer ...
- Image download is complete for a single URL: notification id %1], resource id %2], local path %3], error code %4], flags ...
- Image Relocated} An image file could not be mapped at the address specified in the image file. Local fixups must be performed ...
- Image Relocated} An image file was mapped at a different address from the one specified in the image file but fixups will ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the selected image with this protection. Executable memory is memory that ...
- Image Space is the virtual address space in use by the selected image with this protection. Execute Write Copy is memory ...
- Image Space is the virtual address space in use by the selected image with this protection. Execute/Read Only memory is memory ...
- Image Space is the virtual address space in use by the selected image with this protection. Execute/Read/Write memory is ...
- Image Space is the virtual address space in use by the selected image with this protection. No Access protection prevents ...
- Image Space is the virtual address space in use by the selected image with this protection. Read Only protection prevents ...
- Image Space is the virtual address space in use by the selected image with this protection. Read/Write protection allows ...
- Image Space is the virtual address space in use by the selected image with this protection. Write Copy protection is used ...
- image`i`*`Specifies the provider image path. The matching PDB will be located in the Symbol Server. Multiple paths can be ...
- Immediate steps Because a disk failure will cause you to lose all programs, files and documents on the disk, you should back ...
- Impersonate a client after authentication Assigning this privilege to a user allows programs running on behalf of that user ...