Windows 8
- Age over 21. This program contains some material that many parents would find unsuitable for children under 21 years of age. ...
- Age over 3. This program contains some material that many parents would find unsuitable for children under 3 years of age. ...
- Age over 4. This program contains some material that many parents would find unsuitable for children under 4 years of age. ...
- Age over 5. This program contains some material that many parents would find unsuitable for children under 5 years of age. ...
- Age over 6. This program contains some material that many parents would find unsuitable for children under 6 years of age. ...
- Age over 7. This program contains some material that many parents would find unsuitable for children under 7 years of age. ...
- Age over 8. This program contains some material that many parents would find unsuitable for children under 8 years of age. ...
- Age over 9. This program contains some material that many parents would find unsuitable for children under 9 years of age. ...
- Aggregates and uploads Application Telemetry information if opted-in to the Microsoft Customer Experience Improvement Program. ...
- AIWA TA Utility has a known compatibility issue with this version of Windows and might not run as expected. When you use ...
- AL AL /NoPrompt /NoPrecheck /?, /h, /help - Displays help information - The name of the job file to run - The path to where ...
- Alert: Please be aware that your AD RMS super user {0} is enabled. It is okay to have your super user enabled if you are ...
- Alerts failed because of network failures or because the internal cache size was exceeded. If the problem persists, change ...
- Alerts for a content source with a local address are only supported for a fixed media drive type. Use the UNC name for remote ...
- Algorithm: %1 Key length: %2!d! bits KSP: %3 DNSKEY signature validity: %4!d! hours DS Signature validity: %5!d! hours Zone ...
- Algorithm: %1 Key length: %2!d! bits KSP: %3 DNSKEY signature validity: %4!d! hours DS Signature validity: %5!d! hours Zone ...
- Algorithm: %1 Key length: %2!d! bits KSP: %3 DNSKEY signature validity: %4!d! hours DS Signature validity: %5!d! hours Zone ...
- Algorithm: %1 Key length: %2!d! bits KSP: %3 DNSKEY signature validity: %4!d! hours DS Signature validity: %5!d! hours Zone ...
- Algorithm: %1 Key length: %2!d! bits KSP: %3 DNSKEY signature validity: %4!d! hours Replication: %5 Rollover state: %6 Active ...
- Algorithm: %1 Key length: %2!d! bits KSP: %3 DNSKEY signature validity: %4!d! hours Replication: %5 Rollover state: %6 Rollover ...
- Algorithm: %1 Key length: %2!d! bits KSP: %3 DNSKEY signature validity: %4!d! hours Replication: %5 Rollover state: %6 Rollover ...
- Alias (CNAME) Alias record. Indicates an alternate or alias DNS domain name for a name already specified in other resource ...
- Align text to both left and right margins, adding extra space between words as necessary. This creates a clean look along ...
- Aligning the nodes and sockets of a virtual machine to the hardware topology helps improve the performance of NUMA-aware ...
- All application directory partitions on this Active Directory domain controller will be removed. This domain controller holds ...
- All application directory partitions on this Active Directory domain controller will be removed. This domain controller holds ...
- All approved applications must have a path. For each application in the list marked with "[No path!]", either edit the item ...
- All authenticated incoming servers would be allowed to replicate. All existing authorization entries will be removed. Do ...
- All authentication sets have been deleted from the IPsec configuration on this computer. IPsec Phase: %1 Store Type: %2 ModifyingUser: ...
- All available "%1!s!" licenses for product "%2!s!" on Remote Desktop license server "%3!s!" have been removed. Use RD Licensing ...
- All available disks are dynamic disks and cannot be used to back up system volumes. Attach a basic disk to use for backups. ...
- All available storage in the new cluster has already been assigned to other clustered roles. Storage can only be shared between ...
- All CA servers are in one of the following states: 1. CA server cannot be reached. 2. CA server is busy with previous requests. ...
- All certificate authentication methods using the same certificate signing algorithm must be grouped together in each list. ...
- All certificate authentications using the same signing algorithm must have the same require health setting. You cannot specify ...
- All changes must be performed on the virtual desktop template before you recreate the virtual desktops in this collection. ...
- All connection security rules have been deleted from the IPsec configuration on this computer. Store Type: %1 ModifyingUser: ...
- All connections to the Global Catalog servers are unresponsive or there are fewer connections than are required to run the ...
- All connections to the new member will use a custom connection schedule. To set up a custom connection schedule, click Edit ...
- All connections to the new member will use the replication group schedule. To view the replication group schedule, click ...
- All crypto sets have been deleted from the IPsec configuration on this computer. IPsec Phase: %1 Store Type: %2 ModifyingUser: ...
- All data on the drives to be restored will be replaced with the data in the system image. Are you sure you want to continue? ...
- All data sent between the client and the server is protected by encryption based on the maximum key strength supported by ...
- All data sent between the client and the server is protected by encryption based on the server's maximum key strength. Clients ...
- All data sent between the client and the server uses Federal Information Processing Standard (FIPS) compliant algorithms ...
- All data sent from client to server is protected by encryption based on the maximum key strength supported by the client. ...
- All directory servers in the following site that can replicate the directory partition over this transport are currently ...
- All directory-enabled computers that access the Active Directory in the selected server's domain satisfy the following minimum ...
- All disks to be restored will be formatted and replaced with the layout and data in the system image. Are you sure you want ...
- All domain controllers have migrated successfully to the Global state (%s). Migration has reached a consistent state on all ...
- All domains configured for end-to-end authentication have been removed from the deployment. End-to-end authentication is ...
- All event subscription computer names must be unique. The following names are already in the list and will not be added again: ...
- All existing connections ({0}) will be deleted at the end of the New Topology Wizard so that the new topology can be created. ...
- All file management jobs, reports, and the classification schedule should be compatible with the Task Scheduler 2.0 API on ...
- All inbound replication connections for the partition %1 are disabled. Inbound replication of this partition cannot be performed. ...
- All incoming COM ports are in use. To assign a COM port to this Bluetooth device, you must first delete an existing incoming ...
- All information about which channels you access most frequently will be deleted if you turn off the Most Viewed filter in ...
- All Internet Explorer add-ons, such as ActiveX controls or toolbars, are turned off. Some webpages might not display correctly. ...
- All main mode rules have been deleted from the IPsec configuration on this computer. Store Type: %1 ModifyingUser: %2 ModifyingApplication: ...
- All management servers are unavailable or not responding. Updates required for DirectAccess client compliance might not work ...
- All nodes attempted to arbitrate for Test Disk {0}, but no node successfully arbitrated for ownership of the disk. It is ...
- All nodes need to have a CPU that is capable of Second Layer Address Translation (SLAT) and a GPU that is capable of RemoteFX ...
- All notification of policy changes from LSA/SAM were ignored by policy engine because it timed out to wait for PDC synchronization. ...
- All of Active Directory Domain Services's LDAP send queues are full. This can be caused by clients that continue to send ...
- All of Active Directory Lightweight Directory Services's LDAP send queues are full. This can be caused by clients that continue ...
- All of the computer's names have properly registered host Service Principal Names in the Active Directory Domain Services. ...
- All of your favorite lineups will be deleted and any changes you have made to your channels will be lost. Do you want to ...
- All pending data has been replicated. Access the virtual machine on the replica server and choose the Failover task in the ...
- All pending data has been replicated. Some failover steps did not complete successfully. To complete failover, access the ...
- All pending data has been replicated. You can now start the virtual machine on the Replica server. However, reverse replication ...
- All physical drives failed to read the configuration or returned corrupt data for storage pool %1. As a result the pool will ...
- All pool drives failed to read the configuration or returned corrupt data for storage space %1. As a result the storage space ...
- All previous versions of Connection Manger will be upgraded to Connection Manager 1.4 when this Connection Manager profile ...
- All problems preventing updates to the Active Directory Domain Services database have been cleared. New updates to the Active ...
- All problems preventing updates to the Active Directory Lightweight Directory Services database have been cleared. New updates ...