Feeds

Windows 7 SP1 'beta' leaks, hits torrents

Cool new stuff for server edition

High performance access to file storage

A beta version of Service Pack 1 for Windows 7 and Windows Server 2008 R2 has apparently leaked onto the torrent networks, if you're exceptionally brave and fancy installing a knock-off version of a major OS update.

The intrepid can take some slight reassurance from the information that it can be uninstalled, so your Windows installation might survive the experience long enough for you to install the real thing when it's officially released.

Windows 7 has had a pretty warm reception from most people, so this is not as big a deal as it otherwise might be. After all, Win7 is basically Vista version 1.1 anyway, as even the internal version number admits. SP1 is mainly a rollup of previously-released hotfixes, although some people running earlier leaked versions report that there are new ones in there too.

For desktop Windows, there are no huge changes – the most visible is expected to be built-in support for USB3. Servers running W2K8 R2 will see more improvements, including two new features for those using Hyper-V virtualisation: Dynamic Memory, meaning on-the-fly adjustment of the memory allocation of running virtual machines, and for virtual desktop infrastructure (VDI) users, the new RemoteFX feature, which delivers Direct3D acceleration to users on thin clients.

We may be jaded, but the main reason for a relatively minor SP1 coming so soon after the release of the OS is probably just an effort to reassure those corporates waiting for the first service pack before rolling out the new OS. Microsoft will be very cautious about testing the first big fix-pack for what's been a commendably-stable new OS: before the official release, expect to see a second beta then two release candidates.

Far be it from us to link to downloads of an unauthorised product, but if you go searching, look for build 7601.16562. Those seeking the sheer unbridled excitement of reading the release notes for an unreleased Microsoft product may obtain gratification right here. ®

High performance access to file storage

More from The Register

next story
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.