
Any desktop program must be recompiled before it can run under the ARM environment.

Standard desktop applications are designed for Intel x86-based processors, not ARM chips. The value can only be changed in memory, so the batch file must be triggered each time the RT device boots up. Of course, there are a few gotchas for anyone who wants to run the hack. Those restrictions determine what type of applications RT can run, such as Windows Store apps and desktop apps. In a blog, clrokr explained how he was able to change a value in the Windows RT kernel to bypass certain restrictions put in place by Microsoft. The tool takes advantage of a by someone identified only as clrokr. That hack enables people to launch unsigned desktop applications compiled for ARM-based RT devices.

Someone dubbed Netham45 has that users can trigger on their Windows RT tablets. Microsoft Windows RT CNET Windows RT was recently hacked to allow it to run unsigned desktop apps, and now it seems anyone can run that same hack via a simple batch file.
