Windows Server 2008

  1. If the application was installed via on-demand installation through a COM activation, this is the CLSID that caused the installation ...
  2. If the application was installed via on-demand installation through a COM activation, this is the ProgId that caused the ...
  3. If the changes are trusted then disable and re-enable BitLocker. This will reset BitLocker to use the new boot application ...
  4. If the changes to the system boot information are trusted, then disable and re-enable BitLocker. This will reset BitLocker ...
  5. If the channel didn't change correctly, ensure your IR emitter is positioned correctly. Next try specifying a different channel ...
  6. If the channel didn't change correctly, the control codes may not be correctly identified. Try learning your set-top box ...
  7. If the channel didn't change correctly, the control codes may not be correctly identified. Try relearning your set-top box ...
  8. If the component was imported, no interface information is available. If the component was installed, the interface information ...
  9. If the conflict is a folder, then this attribute gives the total number of files and folders under the conflicted parent ...
  10. If the connection request matches the conditions and constraints of this network policy and the policy grants access, perform ...
  11. If the Create method fails to start, the ErrorControl parameter passes the severity of the error. The value indicates the ...
  12. If the default site in Internet Information Services (IIS) is not already enabled for Secure Sockets Layer (SSL), a self-signed ...
  13. If the DefaultSeparateVDM switch in the Windows section of WIN.INI is TRUE, this flag causes the CreateProcess function to ...
  14. If the DNS resolver is configured with its own IP address and the DNS server is not running locally, the Active Directory ...
  15. If the DNS server cannot be configured to allow underscore characters in the host names, then the computer name must be modified. ...
  16. If the domain exists but is unavailable, try again when it is available. If it no longer exists as a Windows domain, then ...
  17. If the domain no longer exists or is a non-Windows Kerberos Realm, you can use the /FORCE flag to remove the trust objects. ...
  18. If the driver is not compatible, your hardware will not work correctly and your computer might become unstable or stop working ...
  19. If the first protocol specified for a proposal in qmsecmethods is ESP, then no other protocols are allowed in that proposal. ...
  20. If the folders to be replicated already exist on multiple servers, the folders and files on the primary member will be authoritative ...
  21. If the Internet Explorer Information bar does not appear, you can enable the ActiveX control by using the Manage Add-ons ...
  22. If the IP settings are assigned to your computer automatically by using DHCP, contact your network/DNS administrator. The ...
  23. If the license server is installed on a domain controller, terminal servers in the same domain can discover this license ...
  24. If the lines of a Multilink connection fall below the following percentage of capacity for the following period of time, ...
  25. If the lines of a Multilink connection fall below the following percentage of capacity for the specified period of time, ...
  26. If the local revoked certificates are disabled and you apply the changes to this property page by pressing the Ok button ...
  27. If the lockbox version of a client is less than the specified minimum version, the client cannot obtain rights account certificates ...
  28. If the policy provider identified is Windows Firewall, click for information about adjusting Windows Firewall settings. If ...
  29. If the printed patterns look like the example on the left, click "Done". Otherwise click "Align" to repeat the alignment. ...
  30. If the printer information file contains a printer that is already installed on the print server, the printer will be restored ...
  31. If the printer information file contains a printer that is already installed on the print server, the printer will not be ...
  32. If the program is a firewall, it might not be adequately protecting your computer. Uninstall your firewall, but to help make ...
  33. If the provider registration specifies per locale initialization, then the Locale property defines the client locale associated ...
  34. If the provider registration specifies per user initialization, then the User property defines the client principal identity ...
  35. If the Read-only Domain Controller was stolen or compromised, it is recommended that you reset the passwords of the accounts ...
  36. If the realm name is an identifier added to the existing Windows user name, it must be removed before Windows can authenticate ...
  37. If the security descriptor is left blank after defining the policy setting in the template, the policy setting will not be ...
  38. If the session Id in question refers to a protocol, then all users using this protocol will be logged off, continue(n=no)? ...
  39. If the setup key does not appear on the TV, refer to the hardware documentation to make sure the Extender is set up correctly. ...
  40. If the share name is longer than 12 characters, this folder cannot be accessed by computers running Windows 98SE, Windows ...
  41. If the smart card is already in the reader, remove the smart card and insert it again. Note: This certificate cannot be saved ...
  42. If the specified group %1 is not in the RODCs's Allow list, this operation will add this group to the Allow list. Do you ...
  43. If the user does not meet the conditions of this policy, then TS Gateway attempts to verify whether the user meets the conditions ...
  44. If the user has consented to participate in the Windows Customer Experience Improvement Program, this job collects and sends ...
  45. If the user knows the password and wants to change it, he or she should log in, then press CTRL+ALT+DELETE and click Change ...
  46. If the user knows the password and wants to change it, he or she should log in, then use User Accounts in Control Panel to ...
  47. If the UserName parameter specifies an account name, the Password parameter must point to the password to use when connecting ...
  48. If the UserName parameter specifies an account name, the Password parameter must point to the password to use when connecting ...
  49. If the vendor of your network access server hardware or software provides an integer for network access server type, select ...
  50. If the voltage (in millivolts) drops below the value specified by Range1InputVoltageLow property, the UPS will compensate ...
  51. If the voltage (in millivolts) drops below the value specified by Range2InputVoltageLow property, the UPS will compensate ...
  52. If the voltage (in millivolts) rises above the value specified by Range1InputVoltageHigh property, the UPS will compensate ...
  53. If the voltage (in millivolts) rises above the value specified by Range2InputVoltageHigh property, the UPS will compensate ...
  54. If there is a bootable CD or DVD in your computer, remove it, restart the computer and turn on BitLocker again. If the problem ...
  55. If there is some KDC for that domain available, check network connectivity issues or see possible packet fragmentation issues ...
  56. If these programs depend on Windows Desktop Search 3.0, they might not work properly after it is removed. Do you want to ...
  57. If these zones cannot be created, restart your computer following successful promotion of the domain controller. Then, manually ...
  58. If this application has a lower precedence than another, the reason this application has the lower precedence than the next ...
  59. If this flag is set, ole32.dll will use the IsBadReadPtr family of functions to verify pointer arguments in the standard ...
  60. If this is a primary domain controller you must promote it to a Domain Controller and after there is at least one more replica ...
  61. If this is an HTTPS (secure) address, click Tools, click Internet Options, click Advanced, and check to be sure the SSL and ...
  62. If this is an HTTPS (secure) address, click tools, click Internet Options, click Advanced, and check to be sure the SSL and ...
  63. If this is an X86-only application, this property is true if the application may be deployed to an ia64 computer.If FALSE, ...
  64. If this is not the last Active Directory domain controller in the domain, this computer will become a member server in its ...
  65. If this is the correct installation program, click Finish. To start the automatic search again, click Back. To manually search ...
  66. If this is the correct installation program, click Next. To start the automatic search again, click Back. To manually search ...
  67. If this is the correct installation program, click Next. To start the automatic search again, click Back. To manually search ...
  68. If this is the last volume on a storage subsystem that can be managed with this snap-in, the LUN will be reclaimed and the ...
  69. If this option is not selected, the WPAD auto-proxy discovery will be executed within the HTTP client's process with no visible ...
  70. If this printer is shared with users running different versions of Windows, you may want to install additional drivers, so ...
  71. If this problem is consistently preventing Windows from connecting to several different sites on the Internet, contact your ...
  72. If this problem persists, contact Technical Support. Ignore will be chosen by default if you do not respond within 5 minutes. ...
  73. If this problem persists, contact Technical Support. No will be chosen by default if you do not respond within 5 minutes. ...
  74. If this program didn't install correctly, try reinstalling using settings that are compatible with this version of Windows. ...
  75. If this program didn't uninstall correctly, try uninstalling using settings that are compatible with this version of Windows. ...