Windows 8

  1. Manages authentication, authorization, auditing, and accounting for VPN, dial-up, 802.1x wireless or Ethernet switch connection ...
  2. Manages CD recording using Image Mastering Applications Programming Interface (IMAPI). If this service is stopped, this computer ...
  3. Manages CPU for a local or remote Windows Server 2003, Enterprise and Datacenter Editions. Advanced options permit hard affinity ...
  4. Manages dial-up and virtual private network (VPN) connections from this computer to the Internet or other remote networks. ...
  5. Manages file share shadow copies taken by the VSS file share provider. If this service is stopped, file share shadow copies ...
  6. Manages Internet SCSI (iSCSI) sessions from this computer to remote iSCSI target devices. If this service is stopped, this ...
  7. Manages objects in the Network and Dial-Up Connections folder, in which you can view both local area network and remote connections. ...
  8. Manages requests made by Pre-Boot eXecution Environment (PXE) - enabled client computers. If this service is stopped, PXE-enabled ...
  9. Manages requests made by Pre-Boot eXecution Environment (PXE) - enabled client computers. If this service is stopped, PXE-enabled ...
  10. Manages shadow copy of file shares taken by the VSS file server agent. If this service is stopped, file share shadow copies ...
  11. Manages software-based volume shadow copies taken by the Volume Shadow Copy service. If this service is stopped, software-based ...
  12. Manages the configuration and tracking of Component Object Model (COM)+-based components. If the service is stopped, most ...
  13. Manages the configuration settings for using a separate proxy server for SSL communication wsusutil ConfigureSslProxy || ...
  14. Manages users, computers, security groups and other Active Directory objects through data-driven and task-oriented navigation. ...
  15. Manual backup and restore allows you to perform an immediate backup or restoration of the WMI repository to/from a file you ...
  16. Manually add an exemption entry in the NRPT (i.e. with a NULL DNS Address) for the public name/address used by clients to ...
  17. Manually create a network profile This creates a new network profile or locates an existing network and saves a profile for ...
  18. Many APIs use much more stack space on NT than Win9x. This compatibility fix is command line driven and takes a list of APIs ...
  19. Many of the application compatibility strategies in Windows XP depend on "matching information", which will help to identify ...
  20. Many organizations use a registration authority (RA) to manage certificate requests. Use the following certificate to sign ...
  21. Many Windows 9x applications were not programmed to respond to task switches caused by pressing Alt-Tab, the Windows key, ...
  22. Many windows are like forms. They have fields where you might want to enter text. You can get to these fields by saying "Go ...
  23. Map cache file doesn't exist or corrupted. Corrective action taken: Regenerating the map cache file. Domain: %1, Map Name: ...
  24. Map is already defined. Current field definition - Key Field Number = '%1',Field Separator = '%2', New field definition - ...
  25. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  26. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  27. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  28. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  29. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  30. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  31. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  32. Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
  33. Mapped View Alignment Incorrect} An attempt was made to map a view of a file, but either the specified base address or the ...
  34. March 2001 Application Compatibility Package is incompatible with this version of Windows. All of its features are currently ...
  35. Marker error for known Win32 errors that are currently being ignored by the compositor. This is to avoid returning S_OK when ...
  36. Marking an FT (fault tolerant) volume active will only mark underlying partitions active if they are primary partitions. ...
  37. Marking cluster starting at VCN 5 with LCN 6 for 7 clusters in attribute %4 of type code 2 and instance tag 3 as in use by ...
  38. Marking cluster starting at VCN 5 with LCN 6 for 7 clusters in attribute %4 of type code 2 and instance tag 3 as not in use ...
  39. MASK MASK is relevant only for hardware shadow copies after import. The shadow copy disk is removed from the machine and ...
  40. Master Stats: - Notifies Sent = %1!10lu! Requests = %2!10lu! NameError = %3!10lu! FormError = %4!10lu! Refused = %5!10lu! ...
  41. Matched Effective policy for query name %1: Key Name %2: DnsSecValidationRequired %3, DnsQueryOverIPSec %4, DnsEncryption ...
  42. Matched effective policy for query name %1: Key Name %2: DnsSecValidationRequired %3, DnsQueryOverIPSec %4, DnsEncryption ...
  43. Mature audience only. This program is specifically designed to be viewed by adults and therefore may be unsuitable for children ...
  44. MaxBurstLength is not serially greater than FirstBurstLength. Dump data contains FirstBurstLength followed by MaxBurstLength. ...
  45. Maximum acceptable directory search response time (in milliseconds). This rule will issue a warning if the search response ...
  46. Maximum application log size This security setting specifies the maximum size of the application event log, which has a theoretical ...
  47. Maximum command sequence number is not serially greater than expected command sequence number in login response. Dump data ...
  48. Maximum depth below top level has been reached, forcing object to be serialized as strings. Object type at max depth: %1 ...
  49. Maximum depth limit reached when traversing tree, nodes below this level will not be traversed. Possible bug in provider ...
  50. Maximum lifetime for service ticket This security setting determines the maximum amount of time (in minutes) that a granted ...
  51. Maximum lifetime for user ticket renewal This security setting determines the period of time (in days) during which a user's ...
  52. Maximum lifetime for user ticket This security setting determines the maximum amount of time (in hours) that a user's ticket-granting ...
  53. Maximum number of incoming named pipe connections reached; new connections will be queued, and may time out or be rejected. ...
  54. Maximum number of properties per document has been reached. The document is most likely corrupt, or it represents a denial ...
  55. Maximum password age This security setting determines the period of time (in days) that a password can be used before the ...
  56. Maximum run attempt limit for overall amoutn of machine boots reached. Lpremove won't run again. This is error situation ...
  57. Maximum security log size This security setting specifies the maximum size of the security event log, which has a theoretical ...
  58. Maximum Segment Descriptors Exceeded} The command specified a number of descriptors that exceeded the maximum supported by ...
  59. Maximum system log size This security setting specifies the maximum size of the system event log, which has a theoretical ...
  60. Maximum time in minutes allowed for a reboot to complete in an Updating Run. If it takes longer, it is considered a failed ...
  61. Maximum tolerance for computer clock synchronization This security setting determines the maximum time difference (in minutes) ...
  62. MD-PC Link for Mebius V1.01 has a known compatibility issue with this version of Windows. For an update that is compatible ...
  63. MD5 and DES are considered to be insecure algorithms and their use is not recommended. Are you sure that you want to use ...
  64. MDL Read Hits is the percentage of Memory Descriptor List (MDL) Read requests to the file system cache that hit the cache, ...
  65. MDL Reads/sec is the frequency of reads from the file system cache that use a Memory Descriptor List (MDL) to access the ...
  66. Measure battery life during a typical system usage scenario and report energy efficiency issues during idle periods of the ...
  67. Measures the browsing and Windows UI experience on your computer. Measure the impact of drivers, third-party software, and ...
  68. Measures the time to launch the Internet Explorer process, when the Internet Explorer process has already been loaded into ...
  69. Mebius Online User Touroku 5.0 has a known compatibility issue with this version of Windows. For an update that is compatible ...
  70. Mechanisms, such as HTTP cookies, for maintaining an active connection with an individual or for automatically identifying ...
  71. MechWarrior 3 has a known compatibility issue with this version of Windows. For an update that is compatible with this version ...
  72. Media Center Extender cannot find a license to play this content. To acquire a license, try playing this content directly ...
  73. Media Center Extender Setup cannot enable the Media Center Extender exception in the Domain profile of the Windows Firewall. ...
  74. Media Center Extender Setup cannot enable the Media Center Extender exception in the Home profile of the Windows Firewall. ...
  75. Media Center Extender Setup cannot enable the Media Center Extender exception in the Public profile of the Windows Firewall. ...