A developer has issued a patch that will enable users of Windows 7 and 8.1 to circumvent Microsoft's ban on machines with the most modern chipsets from receiving critical updates.
Microsoft recently enforced a rule that stops computers running Intel Kaby Lake microprocessors from installing updates to pre-Windows 10 operating systems.
Kaby Lake is Intel's latest chip microarchitecture and, as such, for many it brought a premature end-of-life to their machines. AMD's Bristol Ridge range is also blocked.
Microsoft, for its part, is simply trying to persuade users to migrate to Windows 10. But of course, that's another £100 to add to the budget for anyone who, for example, is planning to upgrade their PC's CPU.
However, GitHubber Zeffy had been preparing for the arrival of the patch (KB3012218), which was delivered in March's Patch Tuesday. Because of Microsoft's new policy of delivering monthly updates in one or two, large unwieldy files it's not possible to skip individual updates.
Zeffy's solution consists of four batch files, which patch the Windows DLL skipping the CPU version check.
The reverse engineered scripts have now been released to GitHub for inspection, fiddling and general refinement by the open-source developer community. But word on the street is that they work and that, after patching, all security updates are reinstated.
Microsoft has been heavily criticised for the move, which has created an artificial end-of-life to operating systems that are not due to go ex-support for another five years, in the case of Windows 8.1.
The DLL in question, wuaueng.dll, is revised from time to time, after which you'll need to repatch, because it resets the value of "supported CPU" back from ‘1' to ‘0' - so it's not perfect, but it's better than having to succumb to live with an insecure PC due to Microsoft's tactics to force people into upgrading to Windows 10.
However, users are advised to apply the patches at their own risk, of course.
In fear of future shortage - or in preparation for its own electric car project?
But if you're running anything older you'll have to wait
Powered by servers based on Qualcomm's scalable 48-core Centriq 2400 10nm CPUs
Malware has been in circulation for more than a year