Windows 8

  1. If you want your changes to persist across restarts please go to the initial step of the wizard and select Create standard ...
  2. If you would like to specify additional information for your AD RMS-enabled application, you can specify them here as name-value ...
  3. If you would like to use this device again then you will need to enable it. Click next to enable this device, or click Cancel ...
  4. If you're connected to a hotspot or domain network, contact the network administrator. Otherwise: 1. Unplug or turn off the ...
  5. If you're connected to a hotspot or domain network, contact the network administrator. Otherwise: 1. Unplug or turn off the ...
  6. If you're in an area where you'd expect to find this network, it's probably safe to connect. Otherwise, this might be a different ...
  7. If you're prompted to run the Remote Desktop Services ActiveX Client control when you access RD Web Access, do either of ...
  8. If you're running Windows on an ARM-based PC, you can only transfer items using an external hard disk or USB flash drive. ...
  9. If you're running Windows Server 2003 or Windows XP, and you're prompted to run the Remote Desktop Services ActiveX Client ...
  10. If you're running Windows Server 2008 or Windows Vista, click the warning message on the Internet Explorer Information bar, ...
  11. If you're running Windows Server 2008 R2 or Windows 7, in addition to the above steps, you can choose to allow the ActiveX ...
  12. If you're setting up BitLocker on a new drive or a new PC, you only need to encrypt the part of the drive that's currently ...
  13. If you're unable to select an option above, installing the drivers for the disks you are restoring to might solve the problem. ...
  14. If you've selected only some of your optimized files/folders residing on a Deduplication enabled volume for backup, Windows ...
  15. If your AD RMS-enabled application uses extended rights values, provide the rights definitions here. In the Name box, type ...
  16. If your backups contain full volumes, you can manage future performance by choosing one of the following settings. If the ...
  17. If your hardware came with an installation CD, it is recommended that you click Cancel to close this wizard and use the manufacturer's ...
  18. If your Internet service is provided through a cable modem, a DSL modem, or a similar broadband device, it is likely that ...
  19. If your network has both a NAT server and multiple private interfaces, you should configure DHCP on all private segments. ...
  20. If your phone company provided only one phone number and SPID for each ISDN line, select channel 1 for that line, and type ...
  21. If your phone company provided only one phone number for each ISDN line, select channel 1 for that line, and type the phone ...
  22. If your phone company provided only one subaddress and phone number for each ISDN line, select logical terminal 1 for that ...
  23. If your RADIUS clients (authenticating switches or wireless access points) support the assignment of traffic controls using ...
  24. If your RADIUS clients (authenticating switches or wireless access points) support the assignment of traffic controls using ...
  25. If your remote access server is Microsoft Routing and Remote Access, you can define the filters to apply during this connection. ...
  26. If your user names and passwords are lost, damaged, or destroyed then you can use this backup to restore them. You can also ...
  27. IGMP could not schedule a task to be executed. This may have been caused by a memory allocation failure. The data is the ...
  28. IGMP discarded a version %1 packet received on the interface with IP address %2 from a neighbor with IP address %3. The above ...
  29. IGMP Interface Configuration Information for %1!s! - Version : 2!x! IGMP Protocol Type : %3!s! Interface Enabled Flag : %4!s! ...
  30. IGMP Interface Configuration Information for %1!s! - Version : 2!x! IGMP Router Type : %3!s! Interface Enabled Flag : %4!s! ...
  31. IGMP Interface Configuration Information for %1!s! - Version : 2!x! IGMP Router Type : %3!s! Interface Enabled Flag : %4!s! ...
  32. IGMP received a packet which was smaller than the minimum size allowed for IGMP packets. The packet has been discarded. It ...
  33. IGMP received a packet with an invalid header. The packet has been discarded. It was received on the local interface with ...
  34. IGMP received a packet with an invalid version in its header. The packet has been discarded. It was received on the local ...
  35. IGMP Statistics for %1!s! Interface - Interface name %2!s! IP Address %3!s! Type %4!s! Interface State %5!s! Querier State ...
  36. IGMP Statistics for Proxy Interface - Interface name %1!s! IP Address %2!s! Type %3!s! State %4!s! Current Group Memberships ...
  37. IGMP was unable to send a packet from the interface with IP address %1 to the IP address %2. The data is the error code. ...
  38. Igmpv2 detected an error on the local interface with IP address %1. The error occurred while the interface was receiving ...
  39. Igmpv2 was unable to request notification of events on the socket for the local interface with IP address %1. The data is ...
  40. IIS App-Pools could not be retrieved. Either the system does not have IIS installed or the connection to the machine failed ...
  41. IKE failed to find valid machine certificate. Contact your Network Security Administrator about installing a valid certificate ...
  42. IKE negotiation failed because the machine certificate used does not have a private key. IPsec certificates require a private ...
  43. IKE security association establishment failed because peer could not authenticate. The certificate trust could not be established. ...
  44. IKE security association establishment failed because peer sent invalid proposal. Mode: %1 Filter: %2 Attribute: %3 Expected ...
  45. IKE security association negotiation failed. Mode: %1 Filter: %2 Peer Identity: %3 Failure Point: %4 Failure Reason: %5 Extra ...
  46. IKEv1 Main Mode Negotiation Time is the number of milliseconds taken for the last IKEv1 main mode security association negotiated. ...
  47. IKEv1 Quick Mode Negotiation Time is the number of milliseconds taken for the last IKEv1 quick mode security association ...
  48. IKEv2 Main Mode Negotiation Time is the number of milliseconds taken for the last IKEv2 main mode security association negotiated. ...
  49. IKEv2 Quick Mode Negotiation Time is the number of milliseconds taken for the last IKEv2 quick mode security association ...
  50. Illegal network control block (NCB) buffer length on SEND DATAGRAM, SEND BROADCAST, ADAPTER STATUS, or SESSION STATUS. The ...
  51. Illegal System DLL Relocation} The system DLL %hs was relocated in memory. The application will not run properly. The relocation ...
  52. Illegal System DLL Relocation} The system DLL %hs was relocated in memory. The application will not run properly. The relocation ...
  53. Image apply for job {2} in project {3} on computer {0} at location {1} is taking a long time. Make sure the test computer ...
  54. Image download is complete for a single URL: notification id %1], resource id %2], local path %3], error code %4], flags ...
  55. Image Relocated} An image file could not be mapped at the address specified in the image file. Local fixups must be performed ...
  56. Image Relocated} An image file was mapped at a different address from the one specified in the image file but fixups will ...
  57. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  58. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  59. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  60. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  61. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  62. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  63. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  64. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  65. Image Space is the virtual address space in use by the selected image with this protection. Executable memory is memory that ...
  66. Image Space is the virtual address space in use by the selected image with this protection. Execute Write Copy is memory ...
  67. Image Space is the virtual address space in use by the selected image with this protection. Execute/Read Only memory is memory ...
  68. Image Space is the virtual address space in use by the selected image with this protection. Execute/Read/Write memory is ...
  69. Image Space is the virtual address space in use by the selected image with this protection. No Access protection prevents ...
  70. Image Space is the virtual address space in use by the selected image with this protection. Read Only protection prevents ...
  71. Image Space is the virtual address space in use by the selected image with this protection. Read/Write protection allows ...
  72. Image Space is the virtual address space in use by the selected image with this protection. Write Copy protection is used ...
  73. image`i`*`Specifies the provider image path. The matching PDB will be located in the Symbol Server. Multiple paths can be ...
  74. Immediate steps Because a disk failure will cause you to lose all programs, files and documents on the disk, you should back ...
  75. Impersonate a client after authentication Assigning this privilege to a user allows programs running on behalf of that user ...