Feeds

Tester ID leak leaves WinXP beta site wide open

Latest build victim of The Great Escape

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Windows XP beta code has been leaking gently for practically the whole process, but on Friday Microsoft fell victim to the Big One. A beta tester's login leaked, was broadcast across IRC and via instant message, and the Great Escape ensued.

Interim build 2469, which itself showed up on Friday, escaped in volume, but as a beta tester login gives you access to a whole range of stuff, the unauthorised visitors will likely have been able to get hold of whatever different builds were up there (BetaNews reckons 2462 and 2465 were available), and should also have been able to grab server, Professional, Home builds and sundry utilities.

Paranoid rumours that Microsoft spies lurk in the relevant IRC channels seem to have been wide of the mark, or if they do lurk there, they must nap a lot. The account may have acted as an open channel to the XP beta site for up to seven hours before it was disabled, and then the site itself was shut down. It's back up now, and presumably Microsoft only closed it in the first place because of concerns that the security breach may have been more widespread than just a single account leaking out.

Nate Mook of BetaNews says there could have been "tens of thousands" of downloads of the code. This means that 2469 is set to be the fastest-leaking build yet, as practically all of the usual suspects will have early access to ISO images.

Early reports of 2469 however suggest that Microsoft is starting to tighten up on warez. Security seems to have moved on a bit, and previous cracks are reported not to work. Joolz at mswinxp.net meanwhile has decided to pull "All downloads which modify the Windows XP beta in any way, shape or form." The move seems to be a preemptive reaction to a general crack-crackdown by Microsoft:

"I have not been contacted by Microsoft. However, many sites have. Mainly over the crack for Beta 2 (2462) and 2465 that removes the Windows Product Activation and the 180 day limit. This site is for news and information only. Please do NOT contact me regarding cracks or downloads of the beta. I do not have any cracks."

Well it was fun while it lasted, but now it looks like it's no more Mr Nice Redmond... ®

Remote control for virtualized desktops

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
HTML5 vs native: Harry Coder and the mudblood mobile app princes
Developers just want their ideas to generate money
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.