Windows Server 2008
- In order to check the status of a certificate, a revocation configuration for the Online Responder must identify the CA that ...
- In order to check the status of a certificate, a revocation configuration for the Online Responder must identify the CA that ...
- In order to complete the installation of 2], you must restart the computer. Other users are currently logged on to this computer, ...
- In order to dial correctly, your computer might require additional information, such as a calling-card number or the area ...
- In order to enable Slide Show Screen Saver, Windows Media Center will have to activate your Windows Screen Saver. Do you ...
- In order to install Active Directory Domain Services, you must first make these ports available by removing or reconfiguring ...
- In order to request a certificate you can either start based on a pre-configured certificate template and customize it, or ...
- In order to run UNIX-based scripts and custom UNIX-based applications, download the Utilities and SDK for Subsystem for UNIX-based ...
- In order to set administrative callback mode, either you must specify a callback number or the user must already have a callback ...
- In order to share this printer, Windows Firewall must be configured to allow this printer to be shared with other computers ...
- In order to share this printer, Windows Firewall will be configured to allow this printer to be shared with other computers ...
- In order to transfer music to your Creative Nomad digital audio player, you must upgrade to version 2.50 or later. The update ...
- In order to use the SSLCertificateSHA1Hash WMI property, you mustfirst find the hexadecimal Thumbprint value for the certificatethat ...
- In order to view digital services you will need to activate your CableCARD . Please contact you cable service provider. You ...
- In some editions of Windows Vista, the disk might include file shadow copies and older Windows Complete PC Backup images ...
- In some programs, such as Windows Journal, you can write directly in the program, just like you would write on a pad of paper. ...
- In the case of a broken connection or transfer error, Setup will be able to pick up where it left off in most cases. This ...
- In the case of an LDAP-derived instance, the ObjectClass property value(s) may be set to the objectClass attribute values. ...
- In the case of an LDAP-derived instance, the SeeAlso property specifies distinguished name of other Directory objects which ...
- In the case of an LDAP-derived instance, the UserPassword property may contain an encrypted password used to access the person's ...
- In the event of data loss or disk failure, you can reset the password that protects the AD RMS cluster key. If you used the ...
- In the event of data loss or disk failure, you can reset the password that protects the AD RMS cluster key. This policy setting ...
- In the folder where you copied Windows Easy Transfer, double-click MigSetup.exe, and then follow the instructions on the ...
- In the Password Replication Policy, you can specify whose passwords are allowed to replicate to the read-only domain controller ...
- In the Start menu you can choose a computer activity, such as reading new e-mail messages or browsing the Web. This menu ...
- In the value for parameter {0} double quotes were not used, but required. Double quotes are required for all values that ...
- In the wizard page by default, only the most likely to use disk is shown. In the list below, all the disks that are attached ...
- In this section, you can learn how to use a pen to enter text on your Tablet PC. To continue, tap Next , or tap a topic in ...
- In this section, you can learn how to use your pen to interact with objects on the screen. For example, you can learn how ...
- In this stage, the wizard will prompt you for some basic information. You will be prompted for what kind of media you want ...
- In this stage, you can customize the Setup by specifying the level of user interaction, if you are running the wizard under ...
- In this stage, you will be able to set the version number for your customizations as well as specify what directory the package ...
- In this stage, you will need to specify what Microsoft download sites you want to receive your components from, download ...
- In this topology, each member replicates with all other members of the replication group. This topology works well when there ...
- In UDDI Services, data published for a Web service, provider, or tModel can be modified only by the current owner. After ...
- In Windows 9x applications could restart the computer by calling the ExitWindowsEx API. Windows XP requires the application ...
- In Windows 9x, DirectDraw manipulates the palette directly without using GDI, while on NT it uses GDI. Therefore, if an application ...
- In Windows 9x, the DrawText API would accept out of range values and then convert them to acceptable values. This compatibility ...
- In Windows XP, applications are restricted from modifying the system menu. Instead, each application gets a separate copy ...
- In Windows XP, due to a modification in the caching between MoveFile and DeleteFile API's, when the VerInstallFileW API is ...
- In Windows XP, the WS_EX_CLIENTEDGE window style causes applications to run with the taskbar still visible. This may not ...
- In Windows XP, we have changed foreground semantics to stop foreground focus stealing by one app if another application is ...
- InactivityTimeout defines the time limit (in seconds) for automatic disconnection of the phone line, if no data is exchanged. ...
- Inbound Connections Allowed per second is the rate at which inbound connections are being allowed by the Windows Filtering ...
- Inbound Connections Blocked per second is the rate at which inbound connections are being blocked by the Windows Filtering ...
- Inbound Connections is the number of inbound connections allowed by the Windows Filtering Platform since the computer was ...
- Inbound connections must be authenticated to be allowed. Outbound connections are authenticated whenever possible but authentication ...
- Inbound Packets Discarded per second is the rate at which inbound packets are discarded by the Windows Filtering Platform. ...
- Inbound rule for Failover Clusters to allow ICMP4 echo request messages from a remote Failover Cluster Management instance. ...
- Inbound rule for Failover Clusters to allow ICMP6 echo request messages from a remote Failover Cluster Management instance. ...
- Inbound rule for File and Printer Sharing to allow Server Message Block transmission and reception via Named Pipes. TCP 445] ...
- Inbound rule for Media Center Extenders to allow WMDRM-ND and RTP/RTCP AV Streaming. UDP 7777-7781, UDP 5005-5005, UDP 50004-50013] ...
- Inbound rule for the Active Directory Domain Controller service to allow NTP traffic for the Windows Time service. UDP 123] ...
- Inbound rule for the Active Directory Domain Controller service to allow remote Secure Global Catalog traffic. TCP 3269] ...
- Inbound rule for the File Server Resource Manager to allow Server Message Block transmission and reception via Named Pipes. ...
- Inbound rule for the Kernel Transaction Resource Manager for Distributed Transaction Coordinator service to be remotely managed ...
- Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Kernel Transaction Resource Manager for Distributed Transaction ...
- Inbound rule for the Windows Collaboration Computer Name Registration Service to allow use of the Simple Service Discovery ...
- Inbound rule for the Windows Media Player Network Sharing Service to allow use of the Quality Windows Audio Video Experience ...
- Inbound rule for the Windows Media Player Network Sharing Service to allow use of the Quality Windows Audio Video Experience ...
- Inbound rule for the Windows Media Player Network Sharing Service to allow use of the Simple Service Discovery Protocol. ...
- Inbound rule for the Windows Peer to Peer Collaboration Foundation to allow use of the Simple Service Discovery Protocol. ...
- Inbound rule required to permit IPv6 traffic for ISATAP (Intra-Site Automatic Tunnel Addressing Protocol) and 6to4 tunneling ...
- Inbound UDP rule to allow Teredo edge traversal, a technology that provides address assignment and automatic tunneling for ...
- Includes Open Business and Open Volume offerings which are volume licensing programs for small or medium-sized organizations. ...
- Includes/Excludes Event IDs: Enter ID numbers and/or ID ranges separated by commas. To exclude criteria, type a minus sign ...
- Incoming connections are currently enabled on %s. Before you can configure Routing and Remote Access on %s,you must open ...
- Incoming Connections can not issue the ipx network numbers 00000000 or FFFFFFFF. Please either change the assigned network ...
- Incoming Connections depend on the Routing and Remote Access service which was unable to start. For more information, check ...
- Incoming connections depend on the Routing and Remote Access service, which was unable to start. For more information, check ...
- Incoming fax %1 cannot be routed to %2. Verify that folder %2 specified for the incoming routing method exists and that it ...
- Incoming faxes cannot be routed and archived, because the Fax service cannot access the folder %1 specified as the Inbox ...
- Incoming Remote Transactions provides distributed transaction support for applications that enlist in remote transactions. ...
- Incoming: Users in the local domain can authenticate in the specified domain, but users in the specified domain cannot authenticate ...
- Inconsistent information about the computer object {0} was found. This may be caused by a propagation delay for a recent ...