Windows Server 2008

  1. The SetExpandedStringValue method sets the data value for a named value whose data type is REG_EXPAND_SZ. The SetExpandedStringValue ...
  2. The SetForwardBufferMemory method is used to specify how much memory IP allocates to store packet data in the router packet ...
  3. The SetGateways method is used to specify a list of gateways for routing packets destined for a different subnet than the ...
  4. The SetIGMPLevel method is used to set the extent to which the system supports IP multicasting and participates in the Internet ...
  5. The SetIPConnectionMetric method is used to set the routing metric associated with this IP bound adapter. The method returns ...
  6. The SetIPUseZeroBroadcast method is used to set IP zero broadcast usage. If this parameter is set to TRUE, then IP will use ...
  7. The SetIPXFrameTypeNetworkPairs method is used to set Internetworking Packet Exchange (IPX) network number/frame pairs for ...
  8. The SetIPXVirtualNetworkNumber method is used to set the Internetworking Packet Exchange (IPX) virtual network number on ...
  9. The SetKeepAliveInterval method is used to set the interval separating Keep Alive Retransmissions until a response is received. ...
  10. The SetKeepAliveTime method is used to set how often TCP attempts to verify that an idle connection is still available by ...
  11. The SetMTU method is used to set the default Maximum Transmission Unit (MTU) for a network interface. The SetMTU method has ...
  12. The SetMultiStringValue method sets the data value for a named value whose data type is REG_MULTI_SZ. The SetMultiStringValue ...
  13. The SetNumForwardPackets method is used to set the number of IP packet headers allocated for the router packet queue. When ...
  14. The SetPMTUBHDetect method is used to enable detection of Black Hole routers. Setting this parameter to TRUE causes TCP to ...
  15. The SetPMTUDiscovery method is used to enable Maximum Transmission Unit (MTU) discovery. Setting this parameter to TRUE causes ...
  16. The SetPriority method attempts to change the execution priority of the process. In order to set the priority to Realtime, ...
  17. The SetSecurityDescriptor method updates the specified key's security descriptor with the supplied _SecurityDescriptor. The ...
  18. The SetShareInfo method sets the parameters of a shared resource. Only members of the Administrators or Account Operators ...
  19. The SetStatus operation cannot be completed, because another SetStatus operation is already in progress. Try again after ...
  20. The SettableBaudRate property indicates whether the baud rate can be changed for this serial port. Values: TRUE or FALSE. ...
  21. The SettableDataBits property indicates whether data bits can be set for this serial port. Values: TRUE or FALSE. A value ...
  22. The SettableFlowControl property indicates whether flow control can be set for this serial port. Values: TRUE or FALSE. A ...
  23. The SettableParity property indicates whether parity can be set for this serial port. Values: TRUE or FALSE. A value of TRUE ...
  24. The SettableParityCheck property indicates whether parity checking can be set for this serial port (if parity checking is ...
  25. The SettableRLSD property indicates whether RLSD can be set for this serial port (if Received Line Signal Detect (RLSD) is ...
  26. The SettableStopBits property indicates whether stop bits can be set for this serial port. Values: TRUE or FALSE. A value ...
  27. The SetTcpipNetbios method is used to set the default operation of NetBIOS over TCP/IP for this network adapter. Windows ...
  28. The SetTcpMaxConnectRetransmissions method is used to set the number of attempts TCP will retransmit a Connect Request before ...
  29. The SetTcpMaxDataRetransmissions method is used to set the number of times TCP will retransmit an individual data segment ...
  30. The SetTcpNumConnections method is used to set the maximum number of connections that TCP may have open simultaneously.The ...
  31. The SetTcpUseRFC1122UrgentPointer method is used to specify whether TCP uses the RFC 1122 specification for urgent data, ...
  32. The SetTcpWindowSize method is used to set the maximum TCP Receive Window size offered by the system. The Receive Window ...
  33. The Setting class represents configuration-related and operational parameters for one or more ManagedSystemElement(s). A ...
  34. The Setting reference in the Win32_WMIElementSetting association, represents the WMI settings available to the Win32 service. ...
  35. The Setting reference represents a CIM_VideoControllerResolution containing settings that can be applied to the video controller. ...
  36. The Setting reference represents the role of a user that can access a component grouped under the associated Win32_DCOMApplication ...
  37. The Setting reference represents the role of a user that can launch a component grouped under the associated Win32_DCOMApplication ...
  38. The Setting reference represents the Win32_SerialPortConfiguration containing a configuration setting for the serial port. ...
  39. The setting you requested cannot be supported. Open Display in Control Panel, adjust the settings, and then try to change ...
  40. The settings for the proxy server you've chosen to use are blank. This prevents access to the Internet. Do you want to turn ...
  41. The settings for this gadget cannot be found. Close this dialog box and then try again. If the problem persists, contact ...
  42. The settings for this terminal server cannot be retrieved. The remote server does not support running Terminal Services Configuration ...
  43. The settings for this terminal server cannot be retrieved. The remote server does not support running TS RemoteApp Manager ...
  44. The settings have been changed successfully. However note that the new settings will take effect only when the Server For ...
  45. The settings have been changed successfully. However note that the new settings will take effect only when the server is ...
  46. The settings you have chosen may cause some programs to operate improperly if you do not restart your computer now. Would ...
  47. The settings you have selected correspond to a %1 security level. Your security method's type will be changed to reflect ...
  48. The settings you see here are the same ones you set in the wizard. These settings are referred to by the .INS file, but are ...
  49. The settings you select here are for this scope and override settings configured in the Server Options folder for this server. ...
  50. The setup key entered does not appear to be valid. Verify that the setup key used is correct, and select Back to reenter ...
  51. The setup must update files or services that cannot be updated while the system is running. If you choose to continue, a ...
  52. The setup was unable to automatically close all requested applications. Please ensure that the applications holding files ...
  53. The SetWINSServer method sets the primary and secondary Windows Internet Naming Service (WINS) servers on this TCP/IP-bound ...
  54. The shadow copies of volume %2 were aborted because the shadow copy storage volume was not present in time during a previous ...
  55. The shadow copies of volume %2 were aborted because volume %3, which contains shadow copy storage for this shadow copy, has ...
  56. The shadow copies of volume %2 were aborted because volume %3, which contains shadow copy storage for this shadow copy, was ...
  57. The shadow copies of volume %2 were aborted in preparation for hibernation because this volume is used for hibernation and ...
  58. The shadow copies of volume %2 were deleted because the shadow copy storage could not grow in time. Consider reducing the ...
  59. The shadow copy backup for Active Directory Domain Services was unsuccessful. User Action View the event log for subsequent ...
  60. The shadow copy backup for Active Directory Lightweight Directory Services was unsuccessful. User Action View the event log ...
  61. The shadow copy could not be imported, because the Backup Components Document XML file in the metadata .cab file was not ...
  62. The shadow copy of volume %2 could not be created because volume %3, which is specified as the location for shadow copy storage, ...
  63. The shadow copy provider timed out while flushing data to the volume being shadow copied. This is probably due to excessive ...
  64. The shadow copy provider timed out while holding writes to the volume being shadow copied. This is probably due to excessive ...
  65. The shadow copy service cannot be used to back up Active Directory Domain Services in directory services restore mode. User ...
  66. The shadow copy service cannot be used to back up Active Directory Lightweight Directory Services in directory services restore ...
  67. The shadow copy service cannot restore Active Directory Domain Services because Active Directory Domain Services is running. ...
  68. The shadow copy service cannot restore Active Directory Domain Services because the shadow copy used is too old. Shadow copy ...
  69. The shadow copy service cannot restore Active Directory Lightweight Directory Services because Active Directory Lightweight ...
  70. The shadow copy service cannot restore Active Directory Lightweight Directory Services because the shadow copy used is too ...
  71. The shadow copy set break operation failed because the disk/partition identities could not be reverted. The target identity ...
  72. the shadow-copy set only contains only a subset of the volumes needed to correctly backup the selected components of the ...
  73. The share name entered may not be accessible from some MS-DOS workstations. Are you sure you want to use this share name? ...
  74. The share path specified is not valid (contains space(s), colon(s), DBCS character(s)) or you are trying to modify the properties ...
  75. The share uses a custom local user or custom local group for auditing. The custom local user or custom local group will not ...