Feeds

Windows 8.1 Update 1 spewed online a MONTH early – by Microsoft

Someone left the barn door unlocked in Redmond, it seems

Remote control for virtualized desktops

Early leaks of upcoming builds of Windows are common enough, but the latest leak of code purporting to be Windows 8.1 Update 1 comes from an unusual source – Microsoft itself.

On Thursday, wily snoops discovered that the set of six updates that make up the forthcoming overhaul of Windows 8.1 can already be downloaded from Redmond's own servers, and some intrepid hackers even managed to get them via Windows Update.

This, despite the fact that the update has reportedly only just been released to manufacturing, and it wasn't expected to ship to customers before April, at the earliest.

The Windows Update method is tricky, as it involves tweaking a setting in the Registry. And while some online forum members report success using it, others say that Microsoft appears to have already blocked it, such that not all of the required updates appear in Windows Update any longer.

Fear not, though – there are apparently direct download links for all of the updates, and while you can't find them by searching Microsoft's site, helpful hackers have posted them all for you online.

Screenshot showing the leaked packages for Windows 8.1 Update 1

The largest of the leaked updates clocks in at 762MB, indicating it's a major feature release

Separate packages are available for 32-bit x86, x86-64, and ARM versions of Windows – yes, even the unloved Windows RT gets to share the Update 1 wealth – so make sure you only download the ones for the architecture you need, and don't try to mix and match.

Also, forum posters warn that it's essential to install all of the updates in the correct order, or the process will likely fail.

It is at this juncture that we at Vulture Annex in San Francisco would like to caution readers that performing this kind of unsanctioned brain surgery on Windows PCs can very easily have all kinds of undesirable results. If you don't feel 100 per cent confident that you know what you're doing, you're best advised to not try at all.

And if you do run into problems – or even if you don't – don't say The Reg told you to do it. In fact, here you go: Don't do this. It's a bad idea.

That said, if you absolutely can't restrain yourself, you can find complete instructions and direct links to the update packages in the order in which they should be installed here. (And if for some reason those links no longer work, presumably there's always BitTorrent – once the cat is out of the bag on something like this, we find it seldom crawls back in.)

When asked to comment on the matter, a Microsoft spokesman said only, "We look forward to sharing details about the update soon." ®

Internet Security Threat Report 2014

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
HTML5 vs native: Harry Coder and the mudblood mobile app princes
Developers just want their ideas to generate money
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.