Feeds

Secret Windows 7 screens leaked?

Microsoft and the Jackson 5

Internet Security Threat Report 2014

Despite Microsoft's efforts to keep Windows 7 information secret and safe within a close circle of partners and testers until its good and ready, another round of screenshots has found its way to the web.

Over the weekend, the ThinkNext.net blog posted a variety of screenshots purportedly from the latest batch of beta code, Windows 7 M3 Build 6780. Unfortunately, the page is now deader than disco. Someone claiming to be a Microsoft suit emailed the author and dropped enough litigious words of advice to encourage a hasty retreat.

But all is not lost, curious readers. Windows7news is presently hosting the images. You may catch them there before they're gone.

The images include a Windows 7 welcome screen, start menu, administration windows, and updated applications like Windows Media Player, and – YES! - MS Paint and Calculator!

All signs point to things looking pretty Aero-y. That is to say, Microsoft appears to be sticking with the same semi-transparent glass-effect graphic interface used in Windows Vista. You may also know this as the option in Appearance Settings you had to disable because it makes your laptop run like crap. The build does appear to be using the Office 2007 Ribbon interface in Wordpad and Paint. That's a change at least.

Keep in mind the code is still deep in beta country so nobody is promising you Aero. In fact, Microsoft is doing its best to promise you next to nothing this early into the process, having learned a harsh lesson with Vista.

Back before the ponderously maligned OS made its debut, Microsoft made a fine mess out of previewing thrills, chills, and a laundry list of features - along with a thousand elephants that didn't make the cut when Vista hit retail shelves. Customers couldn't help but compare the OS against their artificially enhanced expectations – adding to the grief that made Vista the Tito Jackson of Windows releases (Windows ME is Marlon Jackson, by the way).

We haven't yet received official word whether it was Microsoft that sent the take-down request. We'll update when the datum rolls around. ®

Update

A Microsoft spokeswoman responded that the company is "not aware" of issuing a take-down notice to ThinkNext. She added it's Microsoft's policy not to comment on rumors and speculation.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.