Windows 8

  1. We're sorry, but we can't save ratings for pictures or music on a different computer that is running an earlier version of ...
  2. We've found a Remote Desktop Resource Feed that corresponds to your email address. Do you want to download resources from ...
  3. Web pages can contain elements that could be harmful to your computer. It is important to be certain that the content is ...
  4. Web pages can contain elements that could be harmful to your computer. It is important to be certain that the content is ...
  5. Web Server provides support for HTML Web sites and optional support for ASP.NET, ASP, and Web Server extensions. You can ...
  6. Web Service has got a callback from OData framework about an error. Exception message = %1 Response status code = %2 Response ...
  7. WebCreateHttpRequest completed successfully. (Session %3[%4]) (Method %5) (URI %6) (Version %7.%8) -> (Request Handle %2) ...
  8. WebHttpReceiveEntityBody Inline Completion (Handle: %2) (Error: %6) (Flags: %3) (ResponseFlags %4) CompletionContext (%5) ...
  9. WebHttpReceiveEntityBody Inline Completion (Handle: %2) (Error: %7) (Flags: %3) (DataChunks %4 %5]) CompletionContext (%6) ...
  10. WebProtocolReceiveData Inline Completion (Handle: %2) (Error: %7) (Flags: %3) (DataChunks %4 %5]) CompletionContext (%6) ...
  11. WebSendHttpRequestEntity Inline Completion (Handle: %2) (Error: %7) (Flags: %3) (DataChunks %4 %5]) CompletionContext (%6) ...
  12. WebSetHttpRequestInformationRoutine completed successfully. (Handle %2) (Flags %3) (InformationRoutine %4) (InformationContext ...
  13. WebSetHttpRequestInformationRoutine failed with an error = %6. (Handle %2) (Flags %3) (InformationRoutine %4) (InformationContext ...
  14. Website addresses will be sent to Microsoft to be checked against a list of reported unsafe websites. Information received ...
  15. Weight is used to calculate how often request are sent to a specific server in a group of servers that have the same priority. ...
  16. Welcome to Narrator, a screen reader from Microsoft that reads aloud text and gives you information about objects on your ...
  17. Welcome to the Add Revocation Configuration Wizard. This wizard helps you add a revocation configuration to your Online Responder ...
  18. Welcome to the Enable Load Balancing Wizard. This wizard helps you to enable and configure load balancing in a server cluster, ...
  19. Welcome to the Enable Load Balancing Wizard. This wizard helps you to enable and configure load balancing in a server cluster, ...
  20. Welcome to the Multisite Deployment Wizard. This wizard helps you to enable and configure a multisite deployment, which allows ...
  21. Welcome to the Windows Speech Recognition tutorial! The voice commands you learn here will make it much easier to use Windows ...
  22. Welcome to the WSUS Server Cleanup Wizard. With the help of this wizard, you can remove out-of-date and unused update files, ...
  23. Well Known Services (WKS) Well Known Service (WKS) record. Describes the well-known TCP/IP services supported by a particular ...
  24. WFFSvc service failed to upload the WFF file to Microsoft. Validate that the computer has network connectivity, the proxy ...
  25. WFP filter %12 Status: %13. Instance: %1, FilterId: %11, SrcPrefix: %3, SrcPrefixLength: %4, DstPrefix: %5, DstPrefixLength: ...
  26. WFPv4 is the set of Windows Filtering Platform counters that apply to traffic and connections over Internet Protocol version ...
  27. WFPv6 is the set of Windows Filtering Platform counters that apply to traffic and connections over Internet Protocol version ...
  28. What the notations mean: h = hour m = minute s = second (long time only) tt = A.M. or P.M. h/H = 12/24 hour hh, mm, ss = ...
  29. What type of display is attached to your computer? If more than one display is connected to the computer, select the display ...
  30. What you'll need: A USB flash drive (this requires a USB port on each PC) or an external hard disk that is compatible with ...
  31. When %s logs onto this computer, should the operating system use the roaming profile or just the locally cached copy of the ...
  32. When a block of memory is allotted for future updates, such as the memory allocated to hold discretionary access control ...
  33. When a custom image is selected for a computer, Windows Assessment Services can't run the assessments within the job until ...
  34. When a file location is specified, the authority information access extension requires that the AddToCertificateAia option ...
  35. When a file location is specified, the certificate revocation list distribution point extension supports only the AddToCertificateCdp, ...
  36. When a local path is specified, the certificate revocation list distribution point extension supports only the PublishToServer ...
  37. When a quota or file screening event generates incident reports, default report settings are used. To modify the default ...
  38. When a UNC network location is specified, the authority information access extension requires that the AddToCertificateAia ...
  39. When a UNC network location is specified, the certificate revocation list distribution point extension supports only the ...
  40. When a user is connected through this Connection Manager profile, Connection Manager displays an icon in the notification ...
  41. When a user logs on to a domain, a global catalog server is contacted to determine the universal group memberships of the ...
  42. When a website causes a failure or crash, Internet Explorer attempts to restore the site. It stops after two tries to avoid ...
  43. When adding a server (running the network location server using a self-signed certificate) to a cluster, point the network ...
  44. When adjusting the brightness on the next page, try to get the image to look like the sample image labeled Good brightness ...
  45. When adjusting the contrast on the next page, try to get the image to look like the sample image labeled Good contrast below. ...
  46. When Advanced Audit Policy Configuration settings are used, the "Audit: Force audit policy subcategory settings (Windows ...
  47. When all the DCs are not SP1 or above and you enable this feature there is a possibility that any authenticated user on this ...
  48. When an add-on, such as a toolbar, is installed on your computer, it becomes part of your browser and operating system. In ...
  49. When an HTTP location is specified, the authority information access extension supports only the AddToCertificateAia or the ...
  50. When an HTTP location is specified, the certificate revocation list distribution point extension supports only the AddToCertificateCdp, ...
  51. When an LDAP location is specified, the authority information access extension requires that the AddToCertificateAia option ...
  52. When an LDAP location is specified, the certificate revocation list distribution point extension supports the AddToCertificateCdp, ...
  53. When an object identifier begins with either the number 0 or the number 1, the second number must be in the range of 0 to ...
  54. When asking for client authentication, this server sends a list of trusted certificate authorities to the client. The client ...
  55. When attempting to filter RemoteApps, error converting the SDDL-format security descriptor for resource %2 to a binary-format ...
  56. When Chkdsk checks your disk drive for errors, it might save lost file fragments as files in your disk drive's root folder. ...
  57. When clearing volume flags that have been set using revert on close, the same combination of HIDDEN, READ ONLY, NO DRIVE ...
  58. When clients obtain an address, they are given DHCP options such as the IP addresses of routers (default gateways), DNS servers, ...
  59. When communicating with clients, AD RMS can use Secure Sockets Layer (SSL) to encrypt network traffic. For production deployments, ...
  60. When communicating with clients, the Secure Sockets Layer (SSL) protocol can be used to encrypt network traffic. Choose a ...
  61. When Credential Roaming is disabled, the folders in which the user's credentials are stored are automatically removed from ...
  62. When Credential Roaming is enabled, the folders in which the user's credentials are stored are automatically added to the ...
  63. When dictating to the computer, I should not say one word at a time. I should speak in longer phrases. This helps the computer ...
  64. When dictating to the computer, I should not say one word at a time. I should speak in longer phrases. This helps the computer ...
  65. When dictating to the computer, I should not say one word at a time. I should speak in longer phrases. This helps the computer ...
  66. When dictating to the computer, I should not say one word at a time. I should speak in longer phrases. This helps the computer ...
  67. When dictating to the computer, I should not say one word at a time. I should speak in longer phrases. This helps the computer ...
  68. When dictating to the computer, I should not say one word at a time. I should speak in longer phrases]. This helps the computer ...
  69. When dictating to the computer, I should not say one word at a time. I should speak in longer phrases|. This helps the computer ...
  70. When disabling the Windows Feedback Forwarder group policy object on the organizational unit, an existing group policy object ...
  71. When enabled, installation options on the client computer are defined using the settings in the Windows Deployment Services ...
  72. When enabled, remote file access to this share will be encrypted. This secures the data against unauthorized access while ...
  73. When enabling a multisite deployment, the security groups configured in the DirectAccess Client Setup Wizard must not contain ...
  74. When enabling multisite, the security groups configured for DirectAccess clients must not contain Windows 7 computers. To ...
  75. When Fail-Over Only is already set for 'MPIO Disk3' and pathId 0000000077030000 is set to Active/Optimized, to set pathId ...