Windows 8.1

  1. Media Center Extender Setup cannot enable the Media Center Extender exception in the Domain profile of the Windows Firewall. ...
  2. Media Center Extender Setup cannot enable the Media Center Extender exception in the Home profile of the Windows Firewall. ...
  3. Media Center Extender Setup cannot enable the Media Center Extender exception in the Public profile of the Windows Firewall. ...
  4. Media Center Extender Setup cannot revert changes made to the Media Center Extender exception in the Public profile of the ...
  5. Media Center Extender Setup failed as the Extender was detected on the network but the UPnP search for the Extender failed ...
  6. Media Center Extender Setup has determined that the Windows Firewall is enabled in the Domain, Home and Public profiles. ...
  7. Media Foundation, which includes Windows Media Foundation, the Windows Media Format SDK, and a server subset of DirectShow, ...
  8. Media Only mode keeps Windows Media Center displayed in full screen. In this mode, the minimize and close buttons are hidden. ...
  9. Media player and imaging program compatibility layers were successfully registered for device %1. Layer bits %2 were requested, ...
  10. Media sharing is currently disabled, either because the sharing service is not running or your firewall settings have changed. ...
  11. Media sharing was successfully enabled, however, one or more of the media shared folders (Pictures, Videos and Music) were ...
  12. Media streaming allows you to send your music, pictures and videos to other computers and devices on your network. It also ...
  13. Media streaming is disabled by group policy defined by your administrator. Contact your administrator for policy details. ...
  14. Media usage rights have previously been backed up to this folder. Do you want to replace the older usage rights with the ...
  15. Medium - Safe browsing and still functional - Prompts before downloading potentially unsafe content - Unsigned ActiveX controls ...
  16. Medium alert level: Indicates an item that might affect your privacy or make changes to your PC. Recommended action: Review ...
  17. Medium-high - Appropriate for most websites - Prompts before downloading potentially unsafe content - Unsigned ActiveX controls ...
  18. Medium-low - Appropriate for websites on your local network (intranet) - Most content will be run without prompting you - ...
  19. Medium-low - Same as Medium without prompts - Most content will be run without prompts - Unsigned ActiveX controls will not ...
  20. Member %1 of type %2 in file %3 uses IReference as a parameter. Reference strings are not supported as a method parameter.%0 ...
  21. Member %1 of type %2 in file %3 uses IReferenceArray as a parameter. Reference arrays are not supported as a method parameter.%0 ...
  22. Members of Address-Space-Management (ASM) Administrators group have IPAM Users privileges and can perform IPAM common management ...
  23. Members of Address-Space-Management (ASM) Administrators group have IPAM Users privileges and can perform IPAM common management ...
  24. Members of Multi-Server-Management (MSM) Administrators group have IPAM Users privileges and can perform IPAM common management ...
  25. Members of Multi-Server-Management (MSM) Administrators group have IPAM Users privileges and can perform IPAM common management ...
  26. Members of the IP Audit Administrators group have IPAM Users privileges and can perform IPAM common management tasks and ...
  27. Members of the IP Audit Administrators group have IPAM Users privileges and can perform IPAM common management tasks and ...
  28. Members of the super users group are granted owner use licenses when they request a use license from this AD RMS cluster. ...
  29. Members of the super users group are granted owner use licenses when they request a use license from this AD RMS cluster. ...
  30. Members of this group are afforded additional protections against authentication security threats. See http://go.microsoft.com/fwlink/?LinkId=298939 ...
  31. Members of this group can access WMI resources over management protocols (such as WS-Management via the Windows Remote Management ...
  32. Members of this group can update user accounts in Active Directory with information about license issuance, for the purpose ...
  33. Members of this group can view all information in server inventory, IP address space, and the monitor and manage view of ...
  34. Members of this group can view all information in server inventory, IP address space, and the monitor and manage view of ...
  35. Members of this group may schedule logging of performance counters, enable trace providers, and collect event traces both ...
  36. Members of this role are allowed to examine the configuration of COM+ applications and view information related to active ...
  37. Membership cannot be deleted because it is published. Deleting it would leave the DFS namespace in an inconsistent state. ...
  38. Membership for ReplicatedFolder {0} and Member {1} is not being replicated because the member {1} is referencing an invalid ...
  39. Membership in Account Operators, Domain Admins, Enterprise Admins, or equivalent, is the minimum required to enable or disable ...
  40. Membership information for this object cannot be found in the global catalog. This might occur because the global catalog ...
  41. Membership {0} cannot be enabled because it is not specified as primary. A primary membership must exist within the replication ...
  42. Membership {0} is not listed because it has not yet replicated to the domain controller that was contacted for the list of ...
  43. MEMORY DIAGNOSTIC APPLICATION The following types apply only to entries for memory diagnostic application entries. For information ...
  44. Memory problems can cause your computer to lose information or stop working. To identify and repair the problem, contact ...
  45. Memory Stats: - Memory: Total Memory = %1!10lu! Alloc Count = %2!10lu! Free Count = %3!10lu! Standard Allocs: Used = %4!10lu! ...
  46. Memory usage of a cmdlet has exceeded a warning level. To avoid this situation, try one of the following: 1) Lower the rate ...
  47. Merges a child disk with its parents. Syntax: MERGE VDISK DEPTH= DEPTH= Indicates the number of parents to merge together. ...
  48. Merging profiles adds phone book information, such as access numbers or VPN host addresses, from one or more separate profiles ...
  49. Message Queuing Activation supports process activation via Message Queuing. Applications that use Message Queuing Activation ...
  50. Message Queuing enables distributed applications running at different times to communicate across heterogeneous networks ...
  51. Message Queuing Server provides guaranteed message delivery, efficient routing, security, and priority-based messaging. It ...
  52. Message Queuing Triggers enables the invocation of a COM component or an executable depending on the filters that you define ...
  53. Message Queuing Windows 2000 Client Support is required for Message Queuing clients on Windows 2000 computers in the domain. ...
  54. Messages from senders in the list below will automatically be moved to the Deleted Items folder (for Mail messages) and/or ...
  55. Messages from senders in the list below will automatically be moved to the Deleted Items folder (for Mail messages) and/or ...
  56. Messages logged below this line indicate whether this domain controller will be able to dynamically register DNS records ...
  57. Messages Outbound Errors is the number of ICMP messages that were not send due to problems within ICMP, such as lack of buffers. ...
  58. Messages Received Errors is the number of ICMP messages that the entity received but had errors, such as bad ICMP checksums, ...
  59. Messages Received/sec is the rate, in incidents per second at which ICMP messages were received. The rate includes messages ...
  60. Messages sent to this computer will be repeated back to the sender. This is commonly used for troubleshooting, for example, ...
  61. Messages sent to this computer will be repeated back to the sender. This is commonly used for troubleshooting, for example, ...
  62. Messages Sent/sec is the rate, in incidents per second, at which the server attempted to send. The rate includes those messages ...
  63. Messages you receive with attached files will be displayed in the message list with a small paperclip icon next to them. ...
  64. Messages/sec is the total rate, in incidents per second, at which ICMP messages were sent and received by the entity. The ...
  65. Metadata check: Metadata record on volume %2 could not be read and has been marked for rebuild. If failures continue, decrypt ...
  66. Metadata commit: An attempt to verify metadata update on volume %2 failed at read. If failures continue, decrypt volume. ...
  67. Metadata rebuild: An attempt build a new set of metadata on %2 failed at commit and may appear as disk corruption. If failures ...
  68. Metadata rebuild: An attempt to write a copy of metadata on volume %2 failed and may appear as disk corruption. If failures ...
  69. Method %1 defined in type %2 in file %3 is missing the %4 method definition attribute. This type must have the %4 attribute.%0 ...
  70. Method %1 of type %2 in file %3 has default or optional parameters. Methods that have default and optional parameters are ...
  71. Method %1 on factory interface %2, which is used by class %3 in file %4, has an invalid signature. Factory interface methods ...
  72. Method invocation is not supported in a Windows PowerShell Workflow. To use .NET scripting, place your commands in an inline ...
  73. Method not registered or method's registry data could not be accessed. LoadConfig: FriendlyName, ConfigCLSID both are empty ...
  74. Method not registered or method's registry data could not be accessed. Query registry (%1) failed for method: TypeId=%2, ...
  75. Method not registered or method's registry data could not be accessed. Validation failed for key (%1), Method Info: Type ...