Windows 8

  1. Clear events from an event log and, optionally, back up cleared events. Usage: wevtutil { cl | clear-log } /OPTION:VALUE ...
  2. Clear the check box for packages that you do not want to add and then click Add to add the selected packages to this group. ...
  3. Clear the check box for packages that you do not want to delete and then click Delete to remove the selected packages from ...
  4. Clear the check box for packages that you do not want to modify and then click Enable or Disable. Disabled packages will ...
  5. Clear the check boxes of any virtual hard disks (VHDs) that you do not want to replicate (for example, a VHD used for a dedicated ...
  6. Clear the specific DNS domain in which all KMS SRV records can be found. The specific KMS host will be used if set via /skms. ...
  7. Clear the TPM Clearing the TPM resets it to factory defaults. You will lose all created keys and data protected by those ...
  8. Clearing the policy returns all AppLocker settings to not configured and deletes all existing rules. Do you want to continue? ...
  9. Clearing the policy returns all Windows Firewall with Advanced Security settings to not configured and deletes all connection ...
  10. Clearing this check box allows you to select display modes that this monitor cannot display correctly. This may lead to an ...
  11. ClearType is a software technology developed by Microsoft that improves the readability of text on existing LCDs (Liquid ...
  12. Click a contact from the list below to connect securely without using a password. Click Help someone new to connect to someone ...
  13. Click Add to choose the application file(s) to install. All component files for a given application must be in the same directory ...
  14. Click Add to choose the file(s) to install. All component files for a given partition must be in the same directory as the ...
  15. Click Add to connect to a target portal identified by its IP address or DNS name. The initiator will connect to the portal, ...
  16. Click Advanced to customize verification options. Click Start to check for any system files that are not digitally signed. ...
  17. Click an item from the library to add it to the playlist. Click View library by if you want to change how items are sorted ...
  18. Click Browse to select a file that is signed by a publisher, and then use the slider bar to adjust the scope of the rule. ...
  19. Click Browse to select the file you want to hash. The file's attributes, such as its size and the date and time it was created, ...
  20. Click Cancel, check your internet connection, and then restart Order Prints to try to place your order again. If you continue ...
  21. Click Change to view available Central Access Policies that can be applied to this object, or view details of the applied ...
  22. Click Configure Security Settings to set access permissions. If you do not change the security settings, the default settings ...
  23. Click Fail Over to start the planned failover process for {0}. Any changes on the primary virtual machine that have not already ...
  24. Click Fail Over to start the planned failover process for {0}. Any changes on the primary virtual machine that have not already ...
  25. Click Finish after selecting the drivers to verify. The current settings will be saved and this program will exit. Click ...
  26. Click Finish to close this wizard, and a control panel will open so you can select the Bluetooth devices you want to add ...
  27. Click Finish to verify all the drivers installed on this computer. The current settings will be saved and this program will ...
  28. Click Finish to verify this list of drivers. The current settings will be saved and this program will exit. Click Back to ...
  29. Click here and then select a color from the color palette. This color is used with the pencil and with brushes, as well as ...
  30. Click here to edit the wizard settings. Configuration settings that can be modified include GPO settings, the DirectAccess ...
  31. Click Next after you have selected the settings you want to create. You will then be asked to select the drivers to verify. ...
  32. Click Next if the address range is acceptable. Click Cancel if you wish to exit the wizard in order to define a new static ...
  33. Click Next to create custom settings. You will then be asked to select the custom settings and list of drivers to verify. ...
  34. Click Next to display counters specific to each of the currently verified drivers. Click Back to redisplay the current verifier ...
  35. Click Next to manually select the drivers to verify from a list of all the drivers installed on this computer. Click Back ...
  36. Click Next to manually select verifier settings from a full list. You will then be asked to select the drivers to verify. ...
  37. Click Next to use the current Low Resource Simulation settings. You will then be asked to select the drivers to verify. Click ...
  38. Click Next to use the options already selected for this template, or click Details to customize the certificate request, ...
  39. Click Next to verify all the drivers installed on this computer that are built for older versions of Windows. A list of these ...
  40. Click Next to verify all unsigned drivers installed on this computer. A list of these drivers will be displayed. Click Back ...
  41. Click OK if you want to export the ratings in the Player library to your files. Note that doing so overwrites the current ...
  42. Click on a task to automatically troubleshoot and fix common computer problems. To view more troubleshooters, click on a ...
  43. Click on an extension to view the program that currently opens it by default. To change the default program, click Change ...
  44. Click on the Refresh button on the toolbar to reload the page. After refreshing, you might need to navigate to the specific ...
  45. Click Repair to try and fix the problem. If the problem persists, please contact your system administrator for assistance. ...
  46. Click save to store the results of the diagnostic to removable media such as a USB flash drive, and take it to the computer ...
  47. Click Start, click Network, click Network and Sharing Center, and then click Change adapter settings to add the loopback ...
  48. Click Start, click Network, click Network and Sharing Center, and then click Change adapter settings to configure a static ...
  49. Click Start, click Network, click Network and Sharing Center, and then click Change adapter settings to configure a valid ...
  50. Click Start, click Network, click Network and Sharing Center, and then click Change adapter settings to configure at least ...
  51. Click Start, click Network, click Network and Sharing Center, and then click Change adapter settings to configure DNS servers ...
  52. Click Start, click Network, click Network and Sharing Center, and then click Change adapter settings to configure DNS servers ...
  53. Click Start, click Network, click Network and Sharing Center, and then click Change adapter settings to configure valid IP ...
  54. Click Start, click Network, click Network and Sharing Center, and then click Change adapter settings to remove all invalid ...
  55. Click Start, click Network, click Network and Sharing Center, and then click Change adapter settings to remove or replace ...
  56. Click Start, click Network, click Network and Sharing Center, click Change adapter settings, and then press the Alt key, ...
  57. Click the Next button and save the invitation as a file. Then send the file as an attachment to an email or instant message. ...
  58. Click the Next button to send your helper a Remote Assistance invitation by file or email. If you and your helper use an ...
  59. Click the Restart button below. Be Physically present at the computer to follow the instructions that appear during the startup ...
  60. Click the Shutdown button below. Be Physically present at the computer to follow the instructions that appear during the ...
  61. Click the Unload WSUS Snap-in button to allow MMC to unload the Snap-in. MMC will ask you if you would like to report this ...
  62. Click this to display an overview of this dialog box. For help on an item, click the question mark at the top of the dialog ...
  63. Click to restore files you've previously deleted from the device, and then select Sync now to copy them back to the device. ...
  64. Clicking Cancel will cause all settings to be lost except those for Upstream Server and Proxy Server, which have already ...
  65. Client compliance checking using NAP cannot be enabled because DirectAccess is deployed for remote client management only. ...
  66. Client computers are automatically routed to the most suitable entry point. Optionally, clients can manually select the entry ...
  67. Client computers are automatically routed to the most suitable entry point. Optionally, clients can manually select the entry ...
  68. Client computers cannot communicate with the server by using the SMB 2.0 protocol. As a result, file transfers might be slower, ...
  69. Client computers could experience slower response times if they fail over to a remote domain controller and do not fail back ...
  70. Client computers could experience slower response times if they fail over to a remote folder target and do not fail back ...
  71. Client computers running Windows 7 or Windows Server 2008 R2 will not correctly display Previous Versions snapshot details. ...
  72. Client computers will not be able to access file shares and other Server Message Block (SMB)-based network services on this ...
  73. Client configuration: - Name = %1!s! Address = %2!s! State = %3!s! Shared secret = %4!s! Require auth attrib = %5!s! NAP ...
  74. Client for NFS cannot communicate with the remote Network File System (NFS) server %1. RPC Port Mapper (also known as Portmap ...
  75. Client for NFS enables this computer to access files on UNIX-based NFS servers. When installed, you can configure a computer ...