Feeds

Windows 7 SP1 'beta' leaks, hits torrents

Cool new stuff for server edition

Website security in corporate America

A beta version of Service Pack 1 for Windows 7 and Windows Server 2008 R2 has apparently leaked onto the torrent networks, if you're exceptionally brave and fancy installing a knock-off version of a major OS update.

The intrepid can take some slight reassurance from the information that it can be uninstalled, so your Windows installation might survive the experience long enough for you to install the real thing when it's officially released.

Windows 7 has had a pretty warm reception from most people, so this is not as big a deal as it otherwise might be. After all, Win7 is basically Vista version 1.1 anyway, as even the internal version number admits. SP1 is mainly a rollup of previously-released hotfixes, although some people running earlier leaked versions report that there are new ones in there too.

For desktop Windows, there are no huge changes – the most visible is expected to be built-in support for USB3. Servers running W2K8 R2 will see more improvements, including two new features for those using Hyper-V virtualisation: Dynamic Memory, meaning on-the-fly adjustment of the memory allocation of running virtual machines, and for virtual desktop infrastructure (VDI) users, the new RemoteFX feature, which delivers Direct3D acceleration to users on thin clients.

We may be jaded, but the main reason for a relatively minor SP1 coming so soon after the release of the OS is probably just an effort to reassure those corporates waiting for the first service pack before rolling out the new OS. Microsoft will be very cautious about testing the first big fix-pack for what's been a commendably-stable new OS: before the official release, expect to see a second beta then two release candidates.

Far be it from us to link to downloads of an unauthorised product, but if you go searching, look for build 7601.16562. Those seeking the sheer unbridled excitement of reading the release notes for an unreleased Microsoft product may obtain gratification right here. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
Not appy with your Chromebook? Well now it can run Android apps
Google offers beta of tricky OS-inside-OS tech
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
NHS grows a NoSQL backbone and rips out its Oracle Spine
Open source? In the government? Ha ha! What, wait ...?
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.