Feeds

Windows 8.1 Update 1 spewed online a MONTH early – by Microsoft

Someone left the barn door unlocked in Redmond, it seems

Mobile application security vulnerability report

Early leaks of upcoming builds of Windows are common enough, but the latest leak of code purporting to be Windows 8.1 Update 1 comes from an unusual source – Microsoft itself.

On Thursday, wily snoops discovered that the set of six updates that make up the forthcoming overhaul of Windows 8.1 can already be downloaded from Redmond's own servers, and some intrepid hackers even managed to get them via Windows Update.

This, despite the fact that the update has reportedly only just been released to manufacturing, and it wasn't expected to ship to customers before April, at the earliest.

The Windows Update method is tricky, as it involves tweaking a setting in the Registry. And while some online forum members report success using it, others say that Microsoft appears to have already blocked it, such that not all of the required updates appear in Windows Update any longer.

Fear not, though – there are apparently direct download links for all of the updates, and while you can't find them by searching Microsoft's site, helpful hackers have posted them all for you online.

Screenshot showing the leaked packages for Windows 8.1 Update 1

The largest of the leaked updates clocks in at 762MB, indicating it's a major feature release

Separate packages are available for 32-bit x86, x86-64, and ARM versions of Windows – yes, even the unloved Windows RT gets to share the Update 1 wealth – so make sure you only download the ones for the architecture you need, and don't try to mix and match.

Also, forum posters warn that it's essential to install all of the updates in the correct order, or the process will likely fail.

It is at this juncture that we at Vulture Annex in San Francisco would like to caution readers that performing this kind of unsanctioned brain surgery on Windows PCs can very easily have all kinds of undesirable results. If you don't feel 100 per cent confident that you know what you're doing, you're best advised to not try at all.

And if you do run into problems – or even if you don't – don't say The Reg told you to do it. In fact, here you go: Don't do this. It's a bad idea.

That said, if you absolutely can't restrain yourself, you can find complete instructions and direct links to the update packages in the order in which they should be installed here. (And if for some reason those links no longer work, presumably there's always BitTorrent – once the cat is out of the bag on something like this, we find it seldom crawls back in.)

When asked to comment on the matter, a Microsoft spokesman said only, "We look forward to sharing details about the update soon." ®

The Essential Guide to IT Transformation

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.