Windows 8
- Manages authentication, authorization, auditing, and accounting for VPN, dial-up, 802.1x wireless or Ethernet switch connection ...
- Manages CD recording using Image Mastering Applications Programming Interface (IMAPI). If this service is stopped, this computer ...
- Manages CPU for a local or remote Windows Server 2003, Enterprise and Datacenter Editions. Advanced options permit hard affinity ...
- Manages dial-up and virtual private network (VPN) connections from this computer to the Internet or other remote networks. ...
- Manages file share shadow copies taken by the VSS file share provider. If this service is stopped, file share shadow copies ...
- Manages Internet SCSI (iSCSI) sessions from this computer to remote iSCSI target devices. If this service is stopped, this ...
- Manages objects in the Network and Dial-Up Connections folder, in which you can view both local area network and remote connections. ...
- Manages requests made by Pre-Boot eXecution Environment (PXE) - enabled client computers. If this service is stopped, PXE-enabled ...
- Manages requests made by Pre-Boot eXecution Environment (PXE) - enabled client computers. If this service is stopped, PXE-enabled ...
- Manages shadow copy of file shares taken by the VSS file server agent. If this service is stopped, file share shadow copies ...
- Manages software-based volume shadow copies taken by the Volume Shadow Copy service. If this service is stopped, software-based ...
- Manages the configuration and tracking of Component Object Model (COM)+-based components. If the service is stopped, most ...
- Manages the configuration settings for using a separate proxy server for SSL communication wsusutil ConfigureSslProxy || ...
- Manages users, computers, security groups and other Active Directory objects through data-driven and task-oriented navigation. ...
- Manual backup and restore allows you to perform an immediate backup or restoration of the WMI repository to/from a file you ...
- Manually add an exemption entry in the NRPT (i.e. with a NULL DNS Address) for the public name/address used by clients to ...
- Manually create a network profile This creates a new network profile or locates an existing network and saves a profile for ...
- Many APIs use much more stack space on NT than Win9x. This compatibility fix is command line driven and takes a list of APIs ...
- Many of the application compatibility strategies in Windows XP depend on "matching information", which will help to identify ...
- Many organizations use a registration authority (RA) to manage certificate requests. Use the following certificate to sign ...
- Many Windows 9x applications were not programmed to respond to task switches caused by pressing Alt-Tab, the Windows key, ...
- Many windows are like forms. They have fields where you might want to enter text. You can get to these fields by saying "Go ...
- Map cache file doesn't exist or corrupted. Corrective action taken: Regenerating the map cache file. Domain: %1, Map Name: ...
- Map is already defined. Current field definition - Key Field Number = '%1',Field Separator = '%2', New field definition - ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped View Alignment Incorrect} An attempt was made to map a view of a file, but either the specified base address or the ...
- March 2001 Application Compatibility Package is incompatible with this version of Windows. All of its features are currently ...
- Marker error for known Win32 errors that are currently being ignored by the compositor. This is to avoid returning S_OK when ...
- Marking an FT (fault tolerant) volume active will only mark underlying partitions active if they are primary partitions. ...
- Marking cluster starting at VCN 5 with LCN 6 for 7 clusters in attribute %4 of type code 2 and instance tag 3 as in use by ...
- Marking cluster starting at VCN 5 with LCN 6 for 7 clusters in attribute %4 of type code 2 and instance tag 3 as not in use ...
- MASK MASK is relevant only for hardware shadow copies after import. The shadow copy disk is removed from the machine and ...
- Master Stats: - Notifies Sent = %1!10lu! Requests = %2!10lu! NameError = %3!10lu! FormError = %4!10lu! Refused = %5!10lu! ...
- Matched Effective policy for query name %1: Key Name %2: DnsSecValidationRequired %3, DnsQueryOverIPSec %4, DnsEncryption ...
- Matched effective policy for query name %1: Key Name %2: DnsSecValidationRequired %3, DnsQueryOverIPSec %4, DnsEncryption ...
- Mature audience only. This program is specifically designed to be viewed by adults and therefore may be unsuitable for children ...
- MaxBurstLength is not serially greater than FirstBurstLength. Dump data contains FirstBurstLength followed by MaxBurstLength. ...
- Maximum acceptable directory search response time (in milliseconds). This rule will issue a warning if the search response ...
- Maximum application log size This security setting specifies the maximum size of the application event log, which has a theoretical ...
- Maximum command sequence number is not serially greater than expected command sequence number in login response. Dump data ...
- Maximum depth below top level has been reached, forcing object to be serialized as strings. Object type at max depth: %1 ...
- Maximum depth limit reached when traversing tree, nodes below this level will not be traversed. Possible bug in provider ...
- Maximum lifetime for service ticket This security setting determines the maximum amount of time (in minutes) that a granted ...
- Maximum lifetime for user ticket renewal This security setting determines the period of time (in days) during which a user's ...
- Maximum lifetime for user ticket This security setting determines the maximum amount of time (in hours) that a user's ticket-granting ...
- Maximum number of incoming named pipe connections reached; new connections will be queued, and may time out or be rejected. ...
- Maximum number of properties per document has been reached. The document is most likely corrupt, or it represents a denial ...
- Maximum password age This security setting determines the period of time (in days) that a password can be used before the ...
- Maximum run attempt limit for overall amoutn of machine boots reached. Lpremove won't run again. This is error situation ...
- Maximum security log size This security setting specifies the maximum size of the security event log, which has a theoretical ...
- Maximum Segment Descriptors Exceeded} The command specified a number of descriptors that exceeded the maximum supported by ...
- Maximum system log size This security setting specifies the maximum size of the system event log, which has a theoretical ...
- Maximum time in minutes allowed for a reboot to complete in an Updating Run. If it takes longer, it is considered a failed ...
- Maximum tolerance for computer clock synchronization This security setting determines the maximum time difference (in minutes) ...
- MD-PC Link for Mebius V1.01 has a known compatibility issue with this version of Windows. For an update that is compatible ...
- MD5 and DES are considered to be insecure algorithms and their use is not recommended. Are you sure that you want to use ...
- MDL Read Hits is the percentage of Memory Descriptor List (MDL) Read requests to the file system cache that hit the cache, ...
- MDL Reads/sec is the frequency of reads from the file system cache that use a Memory Descriptor List (MDL) to access the ...
- Measure battery life during a typical system usage scenario and report energy efficiency issues during idle periods of the ...
- Measures the browsing and Windows UI experience on your computer. Measure the impact of drivers, third-party software, and ...
- Measures the time to launch the Internet Explorer process, when the Internet Explorer process has already been loaded into ...
- Mebius Online User Touroku 5.0 has a known compatibility issue with this version of Windows. For an update that is compatible ...
- Mechanisms, such as HTTP cookies, for maintaining an active connection with an individual or for automatically identifying ...
- MechWarrior 3 has a known compatibility issue with this version of Windows. For an update that is compatible with this version ...
- Media Center Extender cannot find a license to play this content. To acquire a license, try playing this content directly ...
- Media Center Extender Setup cannot enable the Media Center Extender exception in the Domain profile of the Windows Firewall. ...
- Media Center Extender Setup cannot enable the Media Center Extender exception in the Home profile of the Windows Firewall. ...
- Media Center Extender Setup cannot enable the Media Center Extender exception in the Public profile of the Windows Firewall. ...