Windows 8

  1. This adapter is part of the Network Bridge. To remove this adapter from the Network Bridge, or to modify bridge settings, ...
  2. This address range was generated from the IP address of your network adapter. You can change the address range by defining ...
  3. This advanced profile offers additional options to configure a NFS file share. Set the folder owners for access-denied assistance ...
  4. This advanced profile offers additional options to configure a SMB file share. Set the folder owners for access-denied assistance ...
  5. This affects handwriting recognition when you write the character by itself, such as when you make corrections in Touch Keyboard ...
  6. This allows the Windows Firewall to be remotely managed using the Windows Firewall with Advanced Security MMC snap-in or ...
  7. This analysis is a comparison of the selected server's configuration to the selected security policy at the given date and ...
  8. This answer file was created with another Windows image. Click Yes to open the Windows image originally associated with the ...
  9. This app can't start because the screen resolution is below 1024x768. Choose a higher screen resolution and then try again. ...
  10. This app has mulitple extensions registered to support the specified contract. Activation by AppUserModelId is ambiguous. ...
  11. This application cannot start because it requires .NET Framework 4 to run. If you are running Windows Server, you can use ...
  12. This application caused a delay during standby: File Name : %3 Friendly Name : %5 Version : %7 Total Time : %8ms Degradation ...
  13. This application caused a delay in the system shutdown process: File Name : %3 Friendly Name : %5 Version : %7 Total Time ...
  14. This application file refers to components that were originally imported into the application. These components must be manually ...
  15. This application file version is not supported. The catalog into which you are attempting to install this application file ...
  16. This application is requesting Windows Media Center to release the tuner. If you select Yes any current or scheduled recordings ...
  17. This application is trying to replace a file on your computer that is protected. Contact the application provider for assistance. ...
  18. This application may not work correctly because your TV signal is not configured. To set up your TV signal, close this application, ...
  19. This application must be installed by an administrator. To finish setup, run the setup file from the Windows Media Center ...
  20. This application took longer than usual to start up, resulting in a performance degradation in the system startup process: ...
  21. This application was set to run forever when the listener was enabled. You may wish to go to the advanced page and modify ...
  22. This assessment can not complete with the basic display driver. Install the correct display driver and run the assessment ...
  23. This assessment is not compatible with the Windows Assessment Console. You can only use assessments that have been created ...
  24. This assessment process started successfully and exited normally, but according to its manifest, the exit code indicated ...
  25. This audio output device cannot play protected content. See the manufacturer's website to update your audio drivers, or use ...
  26. This auditing entry is inherited from the parent object. Make changes here to create a new auditing entry that overrides ...
  27. This backup will include only logon credentials that you've asked Windows to remember. It will not include any credentials ...
  28. This basic profile represents the fastest way to create a NFS file share, typically used to share files with UNIX-based computers. ...
  29. This basic profile represents the fastest way to create an SMB file share, typically used to share files with Windows-based ...
  30. This Briefcase database is corrupt. The files in the Briefcase are okay, but they are no longer in a sync relationship with ...
  31. This CA Root certificate is not trusted. To enable trust, install this certificate in the Trusted Root Certification Authorities ...
  32. This call requires the parameters to specify one extent per disk. A single disk cannot contribute to multiple members or ...
  33. This calling card is missing some required information. To use this card, click Edit to provide more information, or select ...
  34. This can occur if you don't have permission to access the file or folder, or if your computer doesn't meet security policy ...
  35. This Central Access Policy cannot be displayed on this version of Windows. To view this Central Access Policy, go to Security ...
  36. This central access policy could not be found. It may have been deleted from Active Directory or have invalid settings. Restore ...
  37. This certificate already exists in the certificate store you selected. Do you want to overwrite the existing certificate? ...
  38. This certificate cannot be renewed because it does not contain enough information to generate a renewal request. Please request ...
  39. This certificate cannot be used to verify the authenticity of downloaded software because it does not have the appropriate ...
  40. This certificate has been validated on your computer. The remote computer was not used to verify this certificate. To ensure ...
  41. This certificate is not valid because one of the certification authorities in the certification path does not appear to be ...
  42. This certificate is required to enable RemoteApp and Desktop Connection subscription and server authentication for RD Web ...
  43. This certificate trust list cannot be verified. The certificate that countersigned this CTL is not available for verification. ...
  44. This certificate trust list is not valid. The countersignature cannot be verified and the CTL may have been tampered with. ...
  45. This certificate validates to a root certificate that appears to be trusted by the remote computer. To ensure this certificate ...
  46. This certification authority (CA) is not configured to include authority information access locations in the extensions of ...
  47. This certification authority (CA) is not configured to include certificate revocation list (CRL) distribution point locations ...
  48. This certification authority (CA) was installed as an enterprise CA, but Group Policy settings for computer autoenrollment ...
  49. This certification authority (CA) was installed as an enterprise CA, but Group Policy settings for user autoenrollment have ...
  50. This change affects the entire domain. After you raise the domain functional level, it is possible that you may not be able ...
  51. This change affects the entire forest. After you raise the forest functional level, it is possible that you may not be able ...
  52. This change might cause any digital media content that is playing or paused to restart. Do you want to continue with the ...
  53. This change requires clients to update the name used to connect to this clustered role. You will also need to manually restart ...
  54. This change will require administrative clients to update the name used to connect to this cluster. You will also need to ...
  55. This channel cannot be displayed over your DVI or HDMI connection. You can watch this channel using a different type of video ...
  56. This channel is password-protected. You will not be able to synchronize this channel without a username and password. If ...
  57. This channel is unavailable because of a limit to the number of tuners you can use. Verify you are using only as many tuners ...
  58. This checkbox only applies when you are connected to a local network and a dial-up network simultaneously. When checked, ...
  59. This claim type currently applies to classes other than computer and user. If you save the claim type, these classes will ...
  60. This cluster cannot be destroyed. It has non-core application groups which must be deleted before the cluster can be destroyed. ...
  61. This cluster node has lost all network connectivity. It cannot participate in the cluster until connectivity is restored. ...
  62. This cluster node has no network connectivity. It cannot participate in the cluster until connectivity is restored. Run the ...
  63. This cluster node is running with a different message security level ('%1') than remote node '%3' ('%2'). These two nodes ...
  64. This clustered role contains one or more Client Access Points. Deleting them will not remove associated Active Directory ...
  65. This clustered role contains one or more Client Access Points. Deleting them will remove associated Active Directory accounts ...
  66. This cmdlet adds a new external RADIUS server for one of the following purposes 1. VPN authentication 2. Accounting for DirectAccess ...
  67. This cmdlet adds the specified Management servers to the DirectAccess deployment. Management server here refers to patch ...
  68. This cmdlet cannot be used to uninstall Remote Access from the specified entry point. Use the Remove-DAEntrypoint cmdlet ...
  69. This cmdlet configures the properties of the connection to application servers and the IPSec security traffic protection ...
  70. This cmdlet displays the accounting configuration for Remote Access, viz. the different types of accounting that are enabled ...
  71. This cmdlet displays the configured Management servers. Management server here refers to patch servers, domain controllers ...
  72. This cmdlet displays the following 1. Resources accessed over the active DA and VPN connections 2. Resources accessed over ...
  73. This cmdlet displays the following 1. Statistics of current (real-time) active DirectAccess and VPN connections 2. Statistics ...
  74. This cmdlet displays the following 1. Summary statistics of current (real-time) active DirectAccess and VPN connections 2. ...
  75. This cmdlet displays the list of application server security groups that are part of the DA deployment and the properties ...