Windows 8

  1. In addition, substitution of FOR variable references has been enhanced. You can now use the following optional syntax: %~I ...
  2. In both real-time and accounting cases the object consists of the following properties. A separate instance of the object ...
  3. In case of a port conflict, the Windows PowerShell cmdlet Set-IpamConfiguration can be used to update the port and reconfigure ...
  4. In case of sequential node failure or shutdown, this allows the cluster to continue running with less than a majority of ...
  5. In expiration policy settings, the use license expiration duration will not be saved unless you add at least one user or ...
  6. In future versions of Windows, Microsoft might remove dnscmd.exe. If you currently use dnscmd.exe to configure and manage ...
  7. In future versions of Windows, Microsoft might remove the Netsh functionality for %1!s!. Microsoft recommends that you transition ...
  8. In NT 4, GetShortPathName did not care if the file existed - it would give the short path name anyway. This behavior was ...
  9. In order for AD RMS clients to discover this cluster, you must register the AD RMS service connection point (SCP) in "{0}" ...
  10. In order for AD RMS clients to discover this cluster, you must register the AD RMS service connection point (SCP) in this ...
  11. In order for AD RMS clients to discover this cluster, you must register the AD RMS service connection point in "{0}" Active ...
  12. In order for AD RMS clients to discover this cluster, you must register the AD RMS service connection point in this Active ...
  13. In order for Scan Management to display scan server logs, you must enable Remote Event Log Management in Windows Firewall ...
  14. In order for the changes to the RADIUS authentication or accounting ports to take effect, the service must be stopped (if ...
  15. In order for this domain controller to be located by other domain members and domain controllers, the A record corresponding ...
  16. In order for this domain controller to be located by other domain members and domain controllers, the domain controller Locator ...
  17. In order for your changes to take effect, you must restart Windows. Save your work and close all programs, then click Restart ...
  18. In order for your phone book to be downloaded properly, the phone book name must be eight characters or less and it cannot ...
  19. In order to check the status of a certificate, a revocation configuration for the Online Responder must identify the CA that ...
  20. In order to check the status of a certificate, a revocation configuration for the Online Responder must identify the CA that ...
  21. In order to check the status of a certificate, a revocation configuration for the Online Responder must identify the CA that ...
  22. In order to deploy these packages to clients, you must add them to a driver group. A package can be in many driver groups, ...
  23. In order to dial correctly, your computer might require additional information, such as a calling-card number or the area ...
  24. In order to import the trusted publishing domain of "{0}", the drive's current location must be reset from {1} to {2}. Do ...
  25. In order to install Active Directory Domain Services, you must first make these ports available by removing or reconfiguring ...
  26. In order to refresh the drive {0}, it must reset its current location from {1} to drive root {2}. Do you want to continue? ...
  27. In order to remotely administer the cluster the remote registry service is required to be running. If cluster nodes are starting ...
  28. In order to remove the selected item {0}, the drive's current location must be reset from {1} to {2}. Are you sure you want ...
  29. In order to set administrative callback mode, either you must specify a callback number or the user must already have a callback ...
  30. In order to share this printer, Windows Firewall must be configured to allow this printer to be shared with other computers ...
  31. In order to share this printer, Windows Firewall will be configured to allow this printer to be shared with other computers ...
  32. In order to transfer music to your Creative Nomad digital audio player, you must upgrade to version 2.50 or later. The update ...
  33. In particular, there is at least one node ({0}) that has only IPv4 addresses and at least one node ({1}) that has only IPv6 ...
  34. In redirected access mode, clustered roles that are using the Cluster Shared Volume do not have to be stopped while certain ...
  35. In some editions of Windows, the disk might include file shadow copies and older Windows Complete PC Backup images as part ...
  36. In Templates Management, you create and modify NPS templates. NPS templates allow you to create and save an NPS component ...
  37. in the AD RMS logging database has been decrypted successfully. Click Search Report in the Actions pane to locate specific ...
  38. in the domain {2} trust(s) service principal name (SPN) {0} for delegation, but SPN {0} is not registered to an account. ...
  39. In the event of a cluster failover or move to another node, Hyper-V replication will pause if the new node does not also ...
  40. In the event of a failover (planned, unplanned, or test), the Replica virtual machine will come online using the same IP ...
  41. In the event of a failure on the domain's only domain controller, users will not be able to log in to the domain or access ...
  42. In the event of data loss or disk failure, you can reset the password that protects the AD RMS cluster key. If you used the ...
  43. In the event of data loss or disk failure, you can reset the password that protects the AD RMS cluster key. This policy setting ...
  44. In the guest operating system, do the following: Verify that appropriate drivers are installed and all networking devices ...
  45. In the list below, top values take precedence over lower values during classification. Lower values may be overridden by ...
  46. In the Password Replication Policy, you can specify whose passwords are allowed to replicate to the read-only domain controller ...
  47. In the past %1 hour(s) and %2 minute(s), %3 HTTP.SYS responses have had their application requested QoS conflict with URL ...
  48. In the resource mapping for class {0}, the node defines reference-to-collection cmdlets for property {1}, which is not a ...
  49. In the Start menu you can choose a computer activity, such as reading new e-mail messages or browsing the Web. This menu ...
  50. In the upper pane, select a virtual machine or specific files on a virtual machine, then drag and drop them into a folder ...
  51. In the value for parameter {0} double quotes were not used, but required. Double quotes are required for all values that ...
  52. In this section you will learn how to scroll up and down in any open window, close and minimize windows, and switch between ...
  53. In this topology, each member replicates with all other members of the replication group. This topology works well when there ...
  54. In this topology, the Remote Access server is deployed at the edge of the internal corporate network and is configured with ...
  55. In this topology, the Remote Access server is deployed behind an edge firewall or device, and is configured with two adapters. ...
  56. In this topology, the Remote Access server is deployed with a single network adapter that is connected to the internal network. ...
  57. In Windows 2003 and earlier versions of Windows, the Remote Procedure Call (RPC) Locator service manages the RPC name service ...
  58. In Windows 9x applications could restart the computer by calling the ExitWindowsEx API. Windows XP requires the application ...
  59. In Windows 9x, DirectDraw manipulates the palette directly without using GDI, while on NT it uses GDI. Therefore, if an application ...
  60. In Windows 9x, the DrawText API would accept out of range values and then convert them to acceptable values. This compatibility ...
  61. In Windows XP, applications are restricted from modifying the system menu. Instead, each application gets a separate copy ...
  62. In Windows XP, due to a modification in the caching between MoveFile and DeleteFile API's, when the VerInstallFileW API is ...
  63. In Windows XP, the WS_EX_CLIENTEDGE window style causes applications to run with the taskbar still visible. This may not ...
  64. In Windows XP, we have changed foreground semantics to stop foreground focus stealing by one app if another application is ...
  65. In you internet browser, you use the "Go to" command to put the cursor in the address field. Then you dictate the URL of ...
  66. In you internet browser, you use the "Go to" command to put the cursor in the address field. Then you use the spelling panel ...
  67. Inbound allow rule to allow traffic to the network location server deployed on the Remote Access server (with a single network ...
  68. Inbound Allowed Default Block Exempt Packets is the total number of default block exempt packets forwarded from a public ...
  69. Inbound Allowed Default Block Exempt Packets per Second is the rate at which default block exempt packets are forwarded from ...
  70. Inbound Allowed Filter Exempt IPv6 Packets is the total number of IPv6 filter exempt packets forwarded from a public interface ...
  71. Inbound Allowed Filter Exempt IPv6 Packets per Second is the rate at which IPv6 filter exempt packets are forwarded from ...
  72. Inbound Allowed ICMPv6 Packets is the total number of ICMPv6 packets forwarded from a public interface to an internal interface. ...
  73. Inbound Allowed ICMPv6 Packets per Second is the rate at which ICMPv6 packets are forwarded from a public interface to an ...
  74. Inbound Allowed IPv6 IPsec Authenticated Packets is the total number of authenticated IKEv1, IKEv2, AuthIP, or ESP IPv6 packets ...
  75. Inbound Allowed IPv6 IPsec Authenticated Packets per Second is the rate at which authenticated IKEv1, IKEv2, AuthIP or ESP ...