Windows 8

  1. When file and printer sharing is on, files and printers that you have shared from this computer can be accessed by people ...
  2. When forwarding events from local machine to itself, the query of the subscription can't contain target log of the subscription. ...
  3. When generating a cross realm referral from domain %1 the KDC was not able to find the suitable key to verify the ticket. ...
  4. When giving a presentation, your computer stays awake, system notifications are turned off, and the following settings are ...
  5. When going to a website with an address such as https://example.com, try adding the 'www' to the address, https://www.example.com. ...
  6. When Group Policy is selecting a domain controller, it will use the option chosen below. There is a policy that might override ...
  7. When importing or removing a trusted publishing domain, all rights templates needs to be updated. Please exit the current ...
  8. When in 'Repeat' mode, items are played again after being played once. Repeat mode is currently off. Press OK or click Repeat ...
  9. When in 'Repeat' mode, items are played again after being played once. Repeat mode is currently on. Press OK or click Repeat ...
  10. When in 'Shuffle' mode, items are played in random order. Shuffle mode is currently off. Press OK or click Shuffle to turn ...
  11. When in 'Shuffle' mode, items are played in random order. Shuffle mode is currently on. Press OK or click Shuffle to turn ...
  12. When installing HP OpenView 3.0, do not install the included version of pcAnywhere. It installs a version of pcAnywhere that ...
  13. When installing this version of Visual Studio/InterDev, do not install Active Server Pages. If you install Active Server ...
  14. When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP address %1. Your computer may lose connectivity ...
  15. When Internet Connection Sharing is enabled, your network adapter will be set to use IP address 192.168.0.1. This might cause ...
  16. When is "NSEC3", optionally specify the NSEC3 "OptOut" Flag. Default is no OptOut. - When is "NSEC3", optionally specify ...
  17. When it runs out of the allocated set of RIDs, the domain controller {0} will not be able to generate RIDs for new objects. ...
  18. When media streaming is on, people and devices on the network can access pictures, music, and videos on this computer. This ...
  19. When network discovery is on, this computer can see other network computers and devices and is visible to other network computers. ...
  20. When Network Policy Server (NPS) is configured as a RADIUS proxy, remote RADIUS server responses received by NPS must be ...
  21. When NPS is configured as a RADIUS proxy, remote RADIUS server responses received by NPS must be valid. If responses are ...
  22. When password protected sharing is on, only people who have a user account and password on this computer can access shared ...
  23. When permissions on the Windows Search data directories are set incorrectly, the search service might not be able to access ...
  24. When playing WM Audio Professional content over an S/PDIF connection, some enhancements are not available, including visualizations, ...
  25. When policy is no longer applied, would you like to remove the group or the members added to the group? Choose 'Yes' to remove ...
  26. When preparing a new volume shadow copy for volume %2, the shadow copy storage on volume %3 could not be located in non-critical ...
  27. When preparing a new volume shadow copy for volume %2, the shadow copy storage on volume %3 did not have sufficiently large ...
  28. When preparing a new volume shadow copy for volume %2, the shadow copy storage on volume %3 did not have sufficiently large ...
  29. When problem reporting is turned off, your computer cannot send new reports or check for solutions to existing problems. ...
  30. When processing the topology for partition %1, a shortest-path with non-intersecting schedules was found. The path originated ...
  31. When proposed permissions are configured and audit logs are enabled, the difference between current permission and proposed ...
  32. When Public folder sharing is on, people on the network, including homegroup members, can access files in the Public folders. ...
  33. When Remote Access is deployed in multiple domains, it is recommended to use FQDNs to ensure consistent name resolution, ...
  34. When Remote Access is deployed with a single network adapter, specify virtual IP (VIP) addresses and dedicated IP (DIP) addresses ...
  35. When restoring a system image from this volume, the disks on your computer cannot be formatted to match the layout of the ...
  36. When RunAs is enabled for a Windows PowerShell session configuration, the Windows security model will not enforce a security ...
  37. When scheduling a daily synchronization from Microsoft Update, the synchronization start time will have a random offset up ...
  38. When selected, all prestaged devices in the forest are displayed. When unselected, only prestaged devices in the local domain ...
  39. When signed in as administrator, you can let users control how apps use their location and help Microsoft improve its location ...
  40. When snapshot volume %1 was restarted in the system, the restart failed. The volume is no longer found in the system. Try ...
  41. When specifying channel property 'WS_CHANNEL_PROPERTY_HTTP_PROXY_SETTING_MODE' to 'WS_HTTP_PROXY_SETTING_MODE_CUSTOM', channel ...
  42. When specifying multiple certificate authentication proposals, all the certificate proposals with the same signing method ...
  43. When specifying the executable that you want to trace, you must specify a full path to the executable and not just a filename. ...
  44. When specifying tunnel endpoints in both IPv4 and IPv6, a tunnel endpoint may not be dynamic for one address family and explicit ...
  45. When sufficient hardware resources are not available, the security associations are not offloaded and are handled in software ...
  46. When the cluster starts and this setting is enabled, the clustered role will be restarted on the last node on which it was ...
  47. When the clusterResourceGroupName parameter is null, so must be the clusterResourceName and clusterNetworkNames parameters. ...
  48. When the clusterResourceGroupName parameter is null, the clusterResourceName and clusterNetworkNames parameters must also ...
  49. When the installation has ended (successfully or not), please click the Finish button or the Cancel button. DO NOT CLICK ...
  50. When the Migrate a Cluster Wizard was run, it could not access all the nodes in the new cluster. This means that duplicate ...
  51. When the Print Spooler service isn't running, you may not be able to install printers, connect to a network printer, or print ...
  52. When the Remote Access server is configured with two network adapters, the internal and external adapters should be configured ...
  53. When the runspace is set to use the current thread, the apartment state in the invocation settings must match that of the ...
  54. When the schema master role and the domain naming master role are held by the same domain controller, administration of these ...
  55. When the system time is set incorrectly, features that rely on time measurement such as Product Activation, malware scanners, ...
  56. When the transfer is done, you'll see a list of what was transferred, apps you might want to install on your new PC, and ...
  57. When the transfer is done, you'll see a list of what was transferred, apps you might want to install on your new PC, and ...
  58. When the transfer is done, you'll see a list of what was transferred, apps you might want to install on your new PC, and ...
  59. When the transfer is done, you'll see a list of what was transferred, apps you might want to install on your new PC, and ...
  60. When the value of property {0} is removed, the value of its related property {1} will be removed also. Are you sure you want ...
  61. When the Windows Search service is forcibly shut down while performing maintenance, searches might fail or return incomplete ...
  62. When this backup was created, only selected files or folders from volume {0} were included in the backup. If you continue, ...
  63. When this backup was created, only selected files or folders from volumes ({0}) were included in the backup. If you proceed, ...
  64. When this computer discards an incomplete data transmission because the entire transmission required more time than allowed, ...
  65. When this computer discards an incomplete data transmission because the entire transmission required more time than allowed, ...
  66. When this computer discards data it has received due to a problematic header, it will reply to the sender with a "bad header" ...
  67. When this computer discards data it has received due to a problematic header, it will reply to the sender with a bad header ...
  68. When this computer's ability to process incoming data cannot keep up with the rate of a transmission, data will be dropped ...
  69. When this option is cleared, a team created in the guest operating system will lose connectivity if one of the physical network ...
  70. When this parameter is specified the cmdlet returns the Remote Access RADIUS server object representing the RADIUS server ...
  71. When this setting is enabled, this clustered role will automatically be started when the cluster is started. To prevent automatic ...
  72. When trying to update a password, this return status indicates that the value provided as the current password is not correct. ...
  73. When trying to update a password, this return status indicates that the value provided for the new password contains values ...
  74. When trying to update a password, this status indicates that some password update rule has been violated. For example, the ...
  75. When users can define the subject alternate name to be included within a certificate, they can specify an identity other ...