Windows 10
- Website addresses will be sent to Microsoft to be checked against a list of reported unsafe websites. Information received ...
- Websites you visit won't show up in your browsing history, and Microsoft Edge won't save cookies, temporary internet files, ...
- Welcome to Narrator, a screen reader from Microsoft that reads aloud text and gives you information about objects on your ...
- Wersquo;ve got you covered, but we recommend that you do not continue to this website, because it has been reported to Microsoft ...
- WFPv4 is the set of Windows Filtering Platform counters that apply to traffic and connections over Internet Protocol version ...
- WFPv6 is the set of Windows Filtering Platform counters that apply to traffic and connections over Internet Protocol version ...
- What email address would this person like to use to sign in to Windows? (If you know the email address they use to sign in ...
- What the notations mean: h = hour m = minute s = second (long time only) tt = A.M. or P.M. h/H = 12/24 hour hh, mm, ss = ...
- When %s logs onto this computer, should the operating system use the roaming profile or just the locally cached copy of the ...
- When a block of memory is allotted for future updates, such as the memory allocated to hold discretionary access control ...
- When a file or folder is deleted in File Explorer, a copy of the file or folder is placed in the Recycle Bin. Using this ...
- When a Web page is opened in Internet Explorer, Internet Explorer puts restrictions on what the page can do, based on where ...
- When a website causes a failure or crash, Internet Explorer attempts to restore the site. It stops after two tries to avoid ...
- When adjusting the brightness on the next page, try to get the image to look like the sample image labeled Good brightness ...
- When adjusting the contrast on the next page, try to get the image to look like the sample image labeled Good contrast below. ...
- When Advanced Audit Policy Configuration settings are used, the "Audit: Force audit policy subcategory settings (Windows ...
- When an add-on, such as a toolbar, is installed on your computer, it becomes part of your browser and operating system. In ...
- When asking for client authentication, this server sends a list of trusted certificate authorities to the client. The client ...
- When Chkdsk checks your disk drive for errors, it might save lost file fragments as files in your disk drive's root folder. ...
- When clearing volume flags that have been set using revert on close, the same combination of HIDDEN, READ ONLY, NO DRIVE ...
- When completing the pending VM preservation operation, a restore of the virtual machine '%1' could not be initiated: %3 (%4). ...
- When completing the pending VM preservation operation, a restore of the virtual machine '%1' failed: %3 (%4). (Virtual machine ...
- When Credential Roaming is disabled, the folders in which the user's credentials are stored are automatically removed from ...
- When Credential Roaming is enabled, the folders in which the user's credentials are stored are automatically added to the ...
- When file and printer sharing is on, files and printers that you have shared from this computer can be accessed by people ...
- When forwarding events from local machine to itself, the query of the subscription can't contain target log of the subscription. ...
- When giving a presentation, your computer stays awake, system notifications are turned off, and the following settings are ...
- When going to a website with an address such as https://example.com, try adding the 'www' to the address, https://www.example.com. ...
- When Group Policy is selecting a domain controller, it will use the option chosen below. There is a policy that might override ...
- When installing HP OpenView 3.0, do not install the included version of pcAnywhere. It installs a version of pcAnywhere that ...
- When installing this version of Visual Studio/InterDev, do not install Active Server Pages. If you install Active Server ...
- When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP address %1. Your computer may lose connectivity ...
- When Internet Connection Sharing is enabled, your network adapter will be set to use IP address 192.168.0.1. This might cause ...
- When Internet Explorer opens a Web page, it places restrictions on what the page can do, based on the location of the Web ...
- When location is on, the locations obtained to meet the needs of your apps and services will be stored for a limited time ...
- When media streaming is on, people and devices on the network can access pictures, music, and videos on this computer. This ...
- When network discovery is on, this computer can see other network computers and devices and is visible to other network computers. ...
- When operating system support ends, Defender will no longer be supported and your PC might be unprotected. To make sure your ...
- When password protected sharing is on, only people who have a user account and password on this computer can access shared ...
- When permissions on the Windows Search data directories are set incorrectly, the search service might not be able to access ...
- When playing WM Audio Professional content over an S/PDIF connection, some enhancements are not available, including visualizations, ...
- When preparing a new volume shadow copy for volume %1, the shadow copy storage on volume %2 could not be located in non-critical ...
- When preparing a new volume shadow copy for volume %1, the shadow copy storage on volume %2 did not have sufficiently large ...
- When preparing a new volume shadow copy for volume %1, the shadow copy storage on volume %2 did not have sufficiently large ...
- When preparing a new volume shadow copy for volume %2, the shadow copy storage on volume %3 could not be located in non-critical ...
- When preparing a new volume shadow copy for volume %2, the shadow copy storage on volume %3 did not have sufficiently large ...
- When preparing a new volume shadow copy for volume %2, the shadow copy storage on volume %3 did not have sufficiently large ...
- When printing through a print server, determines whether the print spooler on the client will process print jobs itself, ...
- When problem reporting is turned off, your computer cannot send new reports or check for solutions to existing problems. ...
- When processing the topology for partition %1, a shortest-path with non-intersecting schedules was found. The path originated ...
- When Public folder sharing is on, people on the network, including homegroup members, can access files in the Public folders. ...
- When restoring a system image from this volume, the disks on your computer cannot be formatted to match the layout of the ...
- When RunAs is enabled in a Windows PowerShell session configuration, the Windows security model cannot enforce a security ...
- When running in restricted mode, participating apps do not expose credentials to remote computers (regardless of the delegation ...
- When set to true, AM Service will not initiate definition update on start-up, regardless of whether an Engine is present ...
- When set, Windows Defender will check for new signatures before running a scan. If new signatures are found they will be ...
- When several bus and/or connection data widths are possible, the NegotiatedDataWidth property defines the one in use between ...
- When several bus and/or connection speeds are possible, the NegotiatedSpeed property defines the one in use between the devices. ...
- When shutting down, the virtual machine management service timed out waiting for a pending VM preservation operation to complete. ...
- When snapshot volume %1 was restarted in the system, the restart failed. The volume is no longer found in the system. Try ...
- When software (an ActiveX control) is signed, it is possible to tell who published it. Do you want to allow signed software ...
- When specifying channel property 'WS_CHANNEL_PROPERTY_HTTP_PROXY_SETTING_MODE' to 'WS_HTTP_PROXY_SETTING_MODE_CUSTOM', channel ...
- When specifying multiple certificate authentication proposals, all the certificate proposals with the same signing method ...
- When specifying the executable that you want to trace, you must specify a full path to the executable and not just a filename. ...
- When specifying tunnel endpoints in both IPv4 and IPv6, a tunnel endpoint may not be dynamic for one address family and explicit ...
- When starting a VM preservation operation, a fast save of the virtual machine '%1' could not be initiated since Dynamic Memory ...
- When starting a VM preservation operation, a save of the virtual machine '%1' could not be initiated: %3 (%4). (Virtual machine ...
- When sufficient hardware resources are not available, the security associations are not offloaded and are handled in software ...
- When the job is executing or has terminated without error, then this method returns no CIM_Error instance. However, if the ...
- When the media access device supports multiple individual media, this property defines the maximum number which can be supported ...
- When the Print Spooler service isn't running, you may not be able to install printers, connect to a network printer, or print ...
- When the runspace is set to use the current thread, the apartment state in the invocation settings must match that of the ...
- When the system time is set incorrectly, features that rely on time measurement such as Product Activation, malware scanners, ...
- When the Windows Search service is forcibly shut down while performing maintenance, searches might fail or return incomplete ...
- When this check box is selected, this app will alert all users if spyware or other potentially unwanted software attempts ...