Windows 7

  1. When in 'Shuffle' mode, items are played in random order. Shuffle mode is currently on. Press OK or click Shuffle to turn ...
  2. When installing from the CD autorun screen, you can have an HTML file opened by the browser in kiosk mode after system restart. ...
  3. When installing HP OpenView 3.0, do not install the included version of pcAnywhere. It installs a version of pcAnywhere that ...
  4. When installing this version of Visual Studio/InterDev, do not install Active Server Pages. If you install Active Server ...
  5. When instructed below, enter the passkey using your Bluetooth device. For more information about entering a passkey, see ...
  6. When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP address %1. Your computer may lose connectivity ...
  7. When Internet Connection Sharing is enabled, your network adapter will be set to use IP address 192.168.0.1. This might cause ...
  8. When Internet Explorer Enhanced Security Configuration is enabled on your server, the security settings for all Internet ...
  9. When Internet Explorer Enhanced Security Configuration is enabled on your server, the security settings for all Internet ...
  10. When Internet Explorer Enhanced Security Configuration is enabled, the security settings for all intranet sites are set to ...
  11. When Internet Explorer Enhanced Security Configuration is enabled, the security settings for all intranet sites are set to ...
  12. When Internet Explorer navigates to a page which requires an ActiveX control or Java code that is not already on the machine, ...
  13. When Internet Explorer opens a Web page, it places restrictions on what the page can do, based on the location of the Web ...
  14. When it runs out of the allocated set of RIDs, the domain controller {0} will not be able to generate RIDs for new objects. ...
  15. When lookups are case sensitive, the case of returned filenames are always preserved. The CDFScase, FATcase and NTFScase ...
  16. When media streaming is on, people and devices on the network can access pictures, music, and videos on this computer. This ...
  17. When multiple users are logged on to the computer at the same time, additional computer resources might be used which can ...
  18. When network discovery is on, this computer can see other network computers and devices and is visible to other network computers. ...
  19. When password protected sharing is on, only people who have a user account and password on this computer can access shared ...
  20. When permissions on the Windows Search data directories are set incorrectly, the search service might not be able to access ...
  21. When playing WM Audio Professional content over an S/PDIF connection, some enhancements are not available, including visualizations, ...
  22. When policy is no longer applied, would you like to remove the group or the members added to the group? Choose 'Yes' to remove ...
  23. When policy was applied to this machine, the user's machine was in the Internet Explorer enhanced security configuration. ...
  24. When preparing a new volume shadow copy for volume %2, the shadow copy storage on volume %3 could not be located in non-critical ...
  25. When preparing a new volume shadow copy for volume %2, the shadow copy storage on volume %3 did not have sufficiently large ...
  26. When preparing a new volume shadow copy for volume %2, the shadow copy storage on volume %3 did not have sufficiently large ...
  27. When printing through a print server, determines whether the print spooler on the client will process print jobs itself, ...
  28. When problem reporting is turned off, your computer cannot send new reports or check for solutions to existing problems. ...
  29. When processing the topology for partition %1, a shortest-path with non-intersecting schedules was found. The path originated ...
  30. When Public folder sharing is on, people on the network, including homegroup members, can access files in the Public folders. ...
  31. When reading e-mail messages from an IMAP account, a torn envelope icon indicates that only the message header has been downloaded. ...
  32. When reading newsgroup messages, a torn paper icon indicates that only the message header has been downloaded. A whole paper ...
  33. When replying to a message in a newsgroup, first select the message to which you're replying. Then click Reply Group to post ...
  34. When restoring a system image from this volume, the disks on your computer cannot be formatted to match the layout of the ...
  35. When searching for a control, Internet Explorer will first try the location specified in the CODEBASE attribute of the HTML ...
  36. When several bus and/or connection data widths are possible, the NegotiatedDataWidth property defines the one in use between ...
  37. When several bus and/or connection speeds are possible, the NegotiatedSpeed property defines the one in use between the devices. ...
  38. When snapshot volume %1 was restarted in the system, the restart failed. The volume is no longer found in the system. Try ...
  39. When software (an ActiveX control) is signed, it is possible to tell who published it. Do you want to allow signed software ...
  40. When specifying channel property 'WS_CHANNEL_PROPERTY_HTTP_PROXY_SETTING_MODE' to 'WS_HTTP_PROXY_SETTING_MODE_CUSTOM', channel ...
  41. When specifying the executable that you want to trace, you must specify a full path to the executable and not just a filename. ...
  42. When the 'ref' attribute is present the 'type' attribute and the 'complexType', 'simpleType', 'key', 'keyref' and 'unique' ...
  43. When the federation server issues a token to a client, it digitally signs the token using a token-signing certificate. When ...
  44. When the installation has ended (successfully or not), please click the Finish button or the Cancel button. DO NOT CLICK ...
  45. When the media access device supports multiple individual media, this property defines the maximum number which can be supported ...
  46. When the Print Spooler service isn't running, you may not be able to install printers, connect to a network printer, or print ...
  47. When the runspace is set to use the current thread the apartment state in the invocation settings must match that of the ...
  48. When the schema master role and the domain naming master role are held by the same domain controller, administration of these ...
  49. When the setting is on, this program will alert all users if spyware or other potentially unwanted software attempts to run ...
  50. When the setting is on, this program will allow you to see the History, Allowed items, and Quarantined items from all users. ...
  51. When the system time is set incorrectly, features that rely on time measurement such as Product Activation, malware scanners, ...
  52. When the transfer is done, you'll see a list of what was transferred, programs you might want to install on your new computer, ...
  53. When the transfer is done, you'll see a list of what was transferred, programs you might want to install on your new computer, ...
  54. When the user clicks Help in the browser menu bar, and then clicks Online support, the URL you specify below will be displayed ...
  55. When the user clicks Help in the browser menu bar, and then clicks Online Support, the user navigates to the URL you specify ...
  56. When the value of property {0} is removed, the value of its related property {1} will be removed also. Are you sure you want ...
  57. When the Windows Search service is forcibly shut down while performing maintenance, searches might fail or return incomplete ...
  58. When this backup was created, only selected files or folders from volumes ({0}) were included in the backup. If you proceed, ...
  59. When this computer discards an incomplete data transmission because the entire transmission required more time than allowed, ...
  60. When this computer discards an incomplete data transmission because the entire transmission required more time than allowed, ...
  61. When this computer discards data it has received due to a problematic header, it will reply to the sender with a "bad header" ...
  62. When this computer discards data it has received due to a problematic header, it will reply to the sender with a bad header ...
  63. When this computer's ability to process incoming data cannot keep up with the rate of a transmission, data will be dropped ...
  64. When this group is removed, the properties that belong to this group will also be removed. When properties are removed, any ...
  65. When this setting is enabled this service or application will automatically be started when the cluster is started. If you ...
  66. When this setting is enabled this service or application will be restarted on the last node on which it was online when the ...
  67. When trying to update a password, this return status indicates that the value provided as the current password is not correct. ...
  68. When trying to update a password, this return status indicates that the value provided for the new password contains values ...
  69. When trying to update a password, this status indicates that some password update rule has been violated. For example, the ...
  70. When upgrading to a later version of Internet Explorer, the settings from the previous version are retained. If Internet ...
  71. When upgrading to a later version of Internet Explorer, the settings from the previous version are retained. If Internet ...
  72. When users can define the subject alternate name to be included within a certificate, they can specify an identity other ...
  73. When users open a new tab page, they can choose whether the new tab opens a blank page (about:blank), the first page of their ...
  74. When using a cascading RealTimeStylus configuration, the parent RealTimeStylus object must be created with a valid control ...
  75. When using both AH and ESP protocols in a qmsecmethods proposal, the same integrity value must be used for both protocols. ...