Feeds

Microsoft loses grip on slippery Mango

Windows Phone 7.5: Slurp this leak at your phone risk

Internet Security Threat Report 2014

The next version of Microsoft's Windows Phone operating system has arrived early for those willing to risk a slapdown by Redmond.

A version of the code built by Microsoft and delivered to smartphone-makers this summer has apparently slipped free of the Redmond-OEM loop and was leaked online.

The leaked code is build number 7720 of Windows Phone 7.5, which Microsoft signed off and released to phone-makers in July.

A link to the code, better known by its codename of Mango, appeared in the XDA Developers forums here, larded with plenty of warnings.

The post points out this is vanilla MS phone code, missing the tweaks that phone-makers will add to differentiate their phones from those of the competition.

What the post doesn't say, but probably should, is that if you decide to install 7720 on your phone you run the strong chance incurring Microsoft's displeasure.

You might also miss out on future updates once Microsoft and the OEMs officially ship phones loaded with Windows Phone 7.5.

Earlier this year, many users keen to get their hands on the highly anticipated but delayed NoDo release of Windows Phone 7 downloaded the ChevronWP7 hack, created by Chris Walsh, which let them unlock Windows Phone devices and install an unfinished build of NoDo.

Microsoft initially warned against using such home-brew installations, saying it was not sure what would happen to people's phones once the hack was used. As it turned out, people who installed the unofficial update were not able to move to the finished NoDo.

After NoDo was made available, Microsoft took great pleasure in crowing "I told you so" in an official company blog post here. ®

Remote control for virtualized desktops

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.