Windows 8.1 RTM Pro/Enterprise original iso's will be leaked by Wzor


 Share

Recommended Posts

iDav^_^LaFF

1377723872_b2998fcb2392d3f646dca53222504

Google Translate:
friends!
at this time all goes according to plan, will be the original distributions directly from the assembly, as the Russian and English versions of the client systems x86-64 course will be server-Windows Server 2012 R2 (as well as Windows Server 2012 R2 Essentials) and enterprise systems, as well does all the language packs ....
Among other things, will Hyper-V Server 2012 R2, Windows Server 2012 R2 Foundation Storage.
ps: as always, will be placed Magneto and torrent files could all happen much sooner than planned!
all distributions are made ??available to all employees as well as MS OEM partners of the company.
 
by WZT
 
vitz.png
 
images appear earlier than 1 September!
  • Like 1
Link to post
Share on other sites

yowanvista

RTM iso files were just leaked a while ago.

  • Like 1
Link to post
Share on other sites

FaiKee

LOL, downloading thru magnet 1.0+ M/s. :)

Link to post
Share on other sites

Studio384

Very fast connection, never seen before! :) @ 1.4+ MB/s

Link to post
Share on other sites

George P

Can you use these ISOs to do a upgrade and not a clean install?  I don't want to clean install on my main desktop.  Have no issue doing it on my Samsung tablet but I don't think I have the key for it or how that install will be activated if it's not a update. 

 

Maybe as long as I start the install from within the 8.1 preview it'll be fine even if it's basically a clean install??

Link to post
Share on other sites

+Zlip792

LOL, downloading thru magnet 1.0+ M/s. :)

 

Very fast connection, never seen before! :) @ 1.4+ MB/s

 

And I am throttled down from my ISP.. LOL!!! Getting 100 kbps...

Link to post
Share on other sites

yowanvista

Can you use these ISOs to do a upgrade and not a clean install?  I don't want to clean install on my main desktop.  Have no issue doing it on my Samsung tablet but I don't think I have the key for it or how that install will be activated if it's not a update. 

 

Maybe as long as I start the install from within the 8.1 preview it'll be fine even if it's basically a clean install??

 

Those can be used to upgrade from Windows 8.

Link to post
Share on other sites

George P

Those can be used to upgrade from Windows 8.

 

Yeah, I figured it was fine from my desktop that's still on 8.0, besides I do have the win 8 key I used for the clean install on this.  I was really wondering about my Samsung tablet that has the 8.1 preview installed but for which I have no key.  I'm guessing if I just start the installer from within the preview it'll be fine though even if it does a clean install or will I actually have to rollback to 8.0 and then upgrade to 8.1 RTM?   I don't care about losing my installed apps on the tablet, no biggy there.

Link to post
Share on other sites

Studio384

@GP007 - After all: if you already had the 8.1 Preview, you're apps will be restored automatical trough the Windows Store.

  • Like 2
Link to post
Share on other sites

iDav^_^LaFF

MICROSOFT.WINDOWS.8.1.RTM.X86.ENGLISH.DVD-WZT

RELEASE DATE: 08/21/2013

BUILD: 6.3.9600.16384.WINBLUE_RTM.130821-1623
FILE: Windows_8.1_EN-US_x86.ISO
SIZE: 2,915,131,392 byte
SHA-1: 802CFCD3A411D99C097EA7E747F0B6697F9BDAC4
MD5: 7DD36FEA0D004ACFEDBDB3A5521EF5FF
NOTE: this is original M$ image.
 
by WZT 09|28|13

MICROSOFT.WINDOWS.8.1.RTM.X64.ENGLISH.DVD-WZT
RELEASE DATE: 08/21/2013

BUILD: 6.3.9600.16384.WINBLUE_RTM.130821-1623
FILE: Windows_8.1_EN-US_x64.ISO
SIZE: 3,899,295,744 byte
SHA-1: BC2F7FF5C91C9F0F8676E39E703085C65072139B
MD5: F104B78019E86E74B149AE5E510F7BE9
 
NOTE: this is original M$ image.
 
by WZT 09|28|13
 
 
MICROSOFT.WINDOWS.8.1.ENTERPRISE.RTM.X86.VOLUME.ENGLISH.DVD-WZT
RELEASE DATE: 08/21/2013 
BUILD: 6.3.9600.16384.WINBLUE_RTM.130821-1623 
FILE:  Windows_8.1_Ent_EN-US_Vl_x86.ISO 
SIZE: 2,828,421,120 byte 
SHA-1: 87DBCDB8491DBEF1BBC14BE8AB599086789E143C 
MD5: 405091EFE4D58947DB45A106B37DD064 
 
NOTE: this is original M$ image. 
 
by WZT 
08|28|13
 
MICROSOFT.WINDOWS.8.1.ENTERPRISE.RTM.X64.VOLUME.ENGLISH.DVD-WZT
RELEASE DATE: 08/21/2013
BUILD: 6.3.9600.16384.WINBLUE_RTM.130821-1623
FILE: Windows_8.1_Ent_EN-US_Vl_x64.ISO
SIZE: 3,798,214,656 byte
SHA-1: 8311958EDDEDD29E326ED91FDF025D39B88E0FC8
MD5: 2A9589AEEFDC4B94CD527476FA979EE5
 
NOTE: this is original M$ image.
 
by WZT 08|28|13
  • Like 1
Link to post
Share on other sites

Steven P.

Do not post torrent links to these here.

Link to post
Share on other sites

iDav^_^LaFF

Do not post torrent links to these here.

??. Sorry..

  • Like 1
Link to post
Share on other sites

lolneowin

Anyone know if they fixed the font rendering issues?

Link to post
Share on other sites

PGHammer

Can you use these ISOs to do a upgrade and not a clean install?  I don't want to clean install on my main desktop.  Have no issue doing it on my Samsung tablet but I don't think I have the key for it or how that install will be activated if it's not a update. 

 

Maybe as long as I start the install from within the 8.1 preview it'll be fine even if it's basically a clean install??

As long as your install is running 8 (not an 8.1 Preview), I see no reason why not, as it will act like any other update/upgrade (in the case of 8, like a Service Pack).

 

If you are running 8.1 Preview, you will have to reinstall your applications AND re-activate.

 

I'm going to be testing the upgrade process in VMs later today (upgrades from 8 Pro and 8 Enterprise to the respective 8.1 variants).

Link to post
Share on other sites

pratnala

Is this "the" Windows 8.1? Just downloaded it. Can I upgrade my 8 now?

Link to post
Share on other sites

Roger H.

From the posts it doesn't seem you can use your current key to activate so may as well you wait some more.

Link to post
Share on other sites

LimeMaster

I'm guessing it won't work on systems with en-GB lanuage pack.

Link to post
Share on other sites

Dane

From the posts it doesn't seem you can use your current key to activate so may as well you wait some more.

 

 

If your current keys don't work, then is it the finish RTM?   Your regular keys, to do 8-8.1 via the upgrade option should work,  right?

Link to post
Share on other sites

Roger H.

These bits aren't retail AFAIK so that's why current keys wont allow you to install it. You can however install with the leak key then once it's done change to your normal key and then that should activate.

 

Now the issue is do you want to do that :ermm:

Link to post
Share on other sites

ManMountain

There wasn't an upgrade option for me, only options available where to keep personal files only or keep nothing.

 

2r4iq69.jpg

Link to post
Share on other sites

xendrome

If your current keys don't work, then is it the finish RTM?   Your regular keys, to do 8-8.1 via the upgrade option should work,  right?

 

Someone is saying to use the key provided with the ISO to install then change it after to your retail key. But that I believe is for a fresh install. I am also curious about the upgrade question.

Link to post
Share on other sites

xendrome

These bits aren't retail AFAIK so that's why current keys wont allow you to install it. You can however install with the leak key then once it's done change to your normal key and then that should activate.

 

Now the issue is do you want to do that :ermm:

 

 

Well fresh install's would require a new key since this is Windows 8.1 not 8.0, so it makes sense that 8.0 keys do not work with 8.1. The real question is upgrading, actually with an upgrade one would think it would look at the current installed key and continue.

Link to post
Share on other sites

Steven P.

Pretty sure the upgrade path will only be available in the Windows Store.

Link to post
Share on other sites

+Zlip792

One noob questions..

These are OEM rather than Retail... Does it make a difference really???

Link to post
Share on other sites

Panda X

Nevermind apparently I can't see.

Link to post
Share on other sites

This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    No registered users viewing this page.

  • Similar Content

    • By Abhay V
      Windows 7 and 8.1 Patch Tuesday updates are live, here's the complete changelog
      by Abhay Venkatesh



      Just like clockwork, Microsoft is today releasing cumulative updates to all supported Windows versions as part of its Patch Tuesday updates. These include Windows 10 versions that are fully supported – such as the three latest versions, and other SKUs that are supported for certain types of customers, along with Windows 8.1 and users that have opted for Windows 7 Extended Security Updates (ESUs).

      While Windows 8.1 and 7 usually receive a single update a month, the firm released emergency updates for the PrintNightmare vulnerability earlier this month, which will also be bundled into these packages.

      As is always the case with updates for Windows 8.1 and Windows 7, there are two types of updates. They are monthly rollup packages and security-only updates. While monthly rollups are automatically served through Windows Updates, security-only updates can be manually acquired from the Update Catalog and installed on systems.

      For Windows 8.1 and the corresponding Windows Server release, the update is KB5004298, which can also be downloaded from the Update Catalog here. The improvements and fixes made in this update are as follows:

      The security-only update for Windows 8.1 is served by KB5004285, which can be downloaded manually from here. The changelog is similar to that of the monthly rollup, bringing fixes for CVE-2021-33757 and removing the PerformTicketSignature setting. It also contains the single known issue found in the rollup.

      The firm has listed one known issue that is common across both updates, which has been present for a long time. It is not clear when the renaming issue will be fixed. Here is the explanation of that issue provided by the company:

      Symptom

      Workaround

      Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

      Do one of the following:

      Perform the operation from a process that has administrator privilege. Perform the operation from a node that doesn’t have CSV ownership. Microsoft is working on a resolution and will provide an update in an upcoming release.

      Windows 7 and Windows Server 2008 R2 SP1 users that have opted for ESUs will receive monthly rollup via KB5004289 that can be found for manual download here. The security-only update is KB5004307 which can be manually downloaded from here. The changelogs for both the monthly rollup and security-only update are identical to that of Windows 8.1, which is listed above.

      The updates for Windows 7, however, have an additional known issue that might cause the update to fail. The rename bug in Cluster Shared Volume (CSV) folders affects this OS as well. Here is the changelog that details the additional issue:

      Symptom

      Workaround

      After installing this update and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

      This is expected in the following circumstances:

      If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181. If you do not have an ESU MAK add-on key installed and activated. If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the "How to get this update" section of this article.

      As usual, the monthly rollups will be served through Windows Update for supported devices. The security-only updates are to be manually pulled from the Update Catalog links.

    • By Sszecret
      Microsoft Weekly: Continued print nightmares, Windows 11 updates, and test builds
      by Florin Bodnarescu



      Yet another week has gone by, and as a consequence, another recap is in order. On this occasion, we’ll be covering the ongoing mitigations for the PrintNightmare flaw, additional Windows 11 news, and some Insider builds. You can find all the details about that, and more below, in your Microsoft digest for the week of July 4 – 10.

      Continued print nightmares


      If you checked for updates this week, you might’ve seen that Microsoft has pushed out a set of mandatory patches for the most recent versions of Windows 10 going back to 1809, as well as supported instances of Windows 7, 8.1, Server 2008, 2012, and others. This is to provide a fix for the RCE-allowing PrintNightmare flaw in the Print Spooler service.

      According to some security researchers however, the fix above can be bypassed, though as per Microsoft itself, the bypass can only happen when folks are using modified registry values. The firm says that by default, the configuration of the registry entries in question is secure.

      As part of the mitigation process, the functionality of Zebra printers has been broken, though the Redmond giant is working on a fix. We could be seeing yet another set of patches quite soon.

      Windows 11 updates


      Ever since the unveiling of Windows 11, a number of questions have remained, if not unanswered, at least not answered completely. One such question, concerning hardware support for TPM 2.0, was clarified a tad by OEMs this week.

      Asus, Gigabyte, MSI, and others have published a list of hardware that’s set to be compatible with Windows 11 at launch. This hardware includes – covering both standalone components and those part of pre-built systems – AMD’s TRX40 and 300 motherboards, as well as Intel’s X299, C621, C232, C236 platforms, among others.

      It’s important to stress that Microsoft is still testing the waters with support for 1st gen Ryzen and 7th gen Core chips, meaning that the currently published list isn’t the be all end all of supported hardware.

      Speaking of support, even though the Redmond giant hasn’t come out to specifically state this, some of its OEMs have published FAQ pages outlining the fact that Windows 8 and 7 users will be able to upgrade to Windows 11. That said, in the case of the latter, it seems as if a clean install is required.

      For folks trying out the test version of Windows 11, there’s a new Dev channel build – 22000.65 -, which brings the search box back to the Start menu, as well as including fixes for the PrintNightmare exploit, and a number of other quality of life improvements. Coincidentally or not, the firm has also kicked off its first Windows 11 bug bash.

      Last but not least, if you’re running the Canary variant of Edge, you can now enable an “in-progress” visual refresh of the browser that brings it more in line with the design of Microsoft’s next major iteration of Windows. All you have to do is switch on the “Enable Windows 11 Visual Updates” under edge://flags.

      Test builds


      In case you’ve signed up to be an Office Insider, you may start seeing the beginning of the rollout for a UI refresh meant to bring the productivity suite closer visually to Windows 11. If you see any updates available, and especially if you get v16.0.14301.20004, you could be presented with the new UI, thought the rollout seems to be staggered at the moment.

      In other UI and/or UX news, if you are one of the three people who bought a Surface Duo, and also happened to be a Skype Insider, support for split windows is now available on the dual-screen device. Though this is the consumer version we’re talking about, the timing seems a tad odd, with Microsoft prepped to sunset Skype for Business at the end of this month.

      Last but not least, remaining on the subject of EOL and shuttering of solutions, Microsoft has suspended the beta for SQL Server on Windows Containers, instead recommending folks use Linux.

      Dev channel
      Microsoft is planning some improvements for Visual Studio Code, improvements aimed at Java devs. The DoD has scrapped the $10B JEDI contract awarded to Microsoft, and will now award a revamped variant to the Redmond giant and Amazon instead. The Cloud PC could be announced by Microsoft on July 15. Teams is set to add the option to automatically delete meeting recordings form the cloud. Microsoft will be handing out a $1,500 pandemic bonus to nearly all employees. Logging off
      We wrap things up with a look at a small selection of gaming news.



      For one, UFC 4, Tropico 6, Farming Simulator 19, The Medium, and others have either already arrived (in the case of the first two) or will be arriving to Xbox Game Pass across console, PC, and Cloud. As is the case with subscriptions, Endless Space 2, Downwell, CrossCode, UFC, and UFC 2 will be leaving the subscription in mid-July.

      Last but not least, we should mention that Dark Souls III now supports FPS Boost, bumping the framerate to 60FPS on Xbox Series X|S.

      Missed any of the previous columns? Check them all out at this link.



      If you’d like to get a daily digest of news from Neowin, we now have a Newsletter you can sign up to either via the ‘Get our newsletter’ widget in the sidebar, or this link.

    • By Usama Jawad96
      Microsoft: Our PrintNightmare patch is effective, you're just using Windows wrong
      by Usama Jawad

      The PrintNightmare exploit has been a constant headache for IT admins and Microsoft since its discovery last week. Due to the public availability of malicious code, its potential to trigger remote code execution (RCE) quite easily, and the fact that it affects virtually all versions of Windows, Microsoft awarded it a "high" severity score. While an out-of-band (OOB) update was released to fix the issue a couple of days ago, many security researchers are claiming that the patch is ineffective and can be quite easily bypassed. Now, the Redmond tech giant has released a statement emphasizing that the patch works as intended, as long as you are using default registry configurations.



      Microsoft has been tracking the PrintNightmare exploit under CVE-2021-34527, and has been actively updating its guidance around the topic. Although numerous security researchers have publicly disclosed proof of triggering RCE and local privilege escalation (LPE) despite applying the patch, Microsoft claims that this is only because people are using modified registry values that result in an insecure configuration. The company says that:

      In light of the above findings, Microsoft recommends that IT admins actively apply the patch and then review their registry settings. If they align with what is described in the company's advisory, you're all good. If they don't, you need to ensure that they comply with the official documentation.

      It remains to be seen whether this justification is good enough for IT admins and security researchers. As usual, we will let you know as the situation develops.

    • By Abhay V
      Microsoft's patch for PrintNightmare vulnerability can be bypassed completely [Update]
      by Abhay Venkatesh



      Microsoft began rolling out a mandatory security patch for most supported Windows versions yesterday to fix the PrintNightmare vulnerability – a critical issue present in the Windows Print Spooler service tracked under CVE-2021-34527 that when exploited could allow for both remote code execution (RCE) and local privilege escalation (LPE). While yesterday’s update fixed the RCE exploit, the changelog did not mention any fixes for the LPE component.

      Now, security researchers have begun reporting that the patch released yesterday can be bypassed, as it does not fix the problem with the Point and Print policy in Windows – which the firm initially said was not directly related –, which can still be used to perform RCE and LPE. Researchers and experts tweeted proof of concepts (spotted by BleepingComputer) running on fully patched systems, showing off how the patch could be completely bypassed to perform LPE. This was corroborated by another researcher from CERT, Will Dormann.

      Considering that the zero-day vulnerability and its possible exploits have been widely shared in the wild, systems that have the Print Spooler service running might be at active risk of being compromised, especially those in enterprise setups that use the functions to remotely install printer drivers and updates. For now, though, the original workarounds of disabling the Print Spooler service or blocking inbound remote printing through Group Policy might be the best option to mitigate potential threats. While the changes do impact printing functionality, it is a faster fix and negates the need for admins to provision ineffective patches for their organization’s systems.

      You can follow these steps to disable the Print Spooler service through PowerShell:

      Open PowerShell as Administrator Stop-Service -Name Spooler -Force Set-Service -Name Spooler -StartupType Disabled Alternatively, you can inbound remote printing through Group Policy via group policy using the following steps:

      Open the Group Policy Editor Head to Computer Configuration / Administrative Templates / Printers Disable the “Allow Print Spooler to accept client connections:” policy Currently, there is no word from Microsoft about the researchers’ findings, but it will not be surprising to know that the firm is already working on a patch for addressing the issues. It might help to also keep an eye out for updates on the MSRC page tracking the vulnerability.

      Update: Microsoft has updated the MSRC listing noting that it is rolling out patches for Windows Server 2012, Windows Server 2016, and Windows 10, Version 1607. The firm adds that in order to secure the system, users "must confirm that the following registry settings are set to 0 or are not defined".

      Interestingly, CERT researcher Dormann claims that the "NoWarningNoElevationOnInstall = 0 does NOT prevent exploitation". The firm is yet to address the reports from other security research firms as well.

    • By Usama Jawad96
      Microsoft provides further mitigations for PrintNightmare exploit, awards it "high" severity
      by Usama Jawad

      A couple of days ago, we learned of a new exploit called "PrintNightmare" which affects virtually all Windows devices. It makes use of the Windows Print Spooler service's unprotected functions to trigger remote code execution (RCE). The United States Cybersecurity and Infrastructure Security Agency (CISA) highlighted it as a critical vulnerability, with Microsoft actively investigating a fix. Now, the Redmond tech giant has provided more information on the matter.

      PrintNightmare - which is being tracked under CVE-2021-34527 - has now been awarded a Common Vulnerability Scoring System (CVSS) base rating of 8.8. It is important to note that the CVSS v3.0 specification documentation defines this as a "high" severity vulnerability but it is dangerously close to the "critical" range which starts from 9.0. The base score can be a maximum of 10.0. Similarly, it currently has a temporal score of 8.2. The temporal score measures the current exploitability of a vulnerability based on a number of factors.

      It is important to note that a similar vulnerability was fixed in June's Patch Tuesday update, but it had a CVSS base score of 7.8.

      The base score is 8.8 because Microsoft has identified that the attack vector is at a network-level, requires low attack complexity and privileges, does not involve user interaction, and can result in a "total loss" of confidentiality, integrity, and availability of an organizations resources. Meanwhile, the temporal score is 8.2 because functional exploit code is readily available on the internet and works across all versions of Windows, detailed reports about it exist, and some official remediation methods have been suggested.

      Talking about mitigation techniques, we already know that Microsoft suggested disabling the Windows Print Spooler service or at least inbound remote printing through Group Policy. It has now also recommended that membership and nested group membership of some entities is checked. The company suggests that the number of members should be kept as low as possible, and should ideally be zero where possible. That said, it has cautioned that removing members from some of these groups may lead to compatibility issues. The groups in question are as follows:

      Administrators Domain Controllers Read Only Domain Controllers Enterprise Read Only Domain Controllers Certificate Admins Schema Admins Enterprise Admins Group Policy Admins Power Users System Operators Print Operators Backup Operators RAS Servers Pre-Windows 2000 Compatible Access Network Configuration Operators Group Object Cryptographic Operators Group Object Local account and member of Administrators group Microsoft has emphasized that a fix will be made available as soon as possible, but in the meantime, it has recommended that organizations make use of tooling like Microsoft Defender 365 to monitor potentially malicious activity. Although Print and Point is not directly related to this exploit, the Redmond tech giant has still suggested editing some registry values in order to harden your organization's local security infrastructure, and stated that print servers utilized by clients should be explicitly listed.