Welcome!

Linux Containers Authors: Liz McMillan, Elizabeth White, Carmen Gonzalez, Pat Romanski, XebiaLabs Blog

News Feed Item

Real Studio Web Edition-Powered Website Thrives Against Major Hack Attempt; Proves Unprecedented Security Protection for Web Apps

Real Software, creator of award-winning cross-platform web and desktop app development tools, prides itself on the revolutionary new visual way to make web apps using Real Studio, but also has demonstrated high security for web apps. Targeted attacks and data theft are changing web security. According to this study from HP’s Application Security Center, for every known web app, seven out of ten times there is at least one SQL injection flaw that is just waiting to be discovered by a hacker.

Bob Keeney, a longtime Real Studio developer, and CEO of BKeeney Software, a consulting, training and custom software development company, was recently victim to a website hack attempt. It unfortunately brought down his entire website, except the section he had created as a web application using Real Studio Web Edition.

Bob’s website was using an older version of the popular CMS, Joomla. When he first started offering Real Studio video training, he was relying upon several Joomla components that would stop working if they updated to a newer version. A little more than a year ago, Bob converted the Real Studio training section of the website to a Real Studio web app.

"We were down for about 24 hours after the hack, as we had to spend some time formatting new webpages, rearranging links and uploading it to get the site back up and running," detailed Keeney. "We believe the hacker was able to upload a PHP file through a flaw in Joomla, which executed a variety of commands that rewrote many of the PHP files, so it could execute arbitrary commands and reinfect itself again if we didn’t eradicate all of the infected files."

“Our main website would not load and it also took down our bug tracking system, which also uses PHP,” continued Keeney. “Our Real Studio video training app functioned perfectly, however. In fact, we even had several people sign up for subscriptions and many were watching videos even though the rest of the website was down.”

“At Real Software, we take web security very seriously in the Real Studio web application framework,” commented Geoff Perlman, Real Software Founder and CEO. “Because web apps are accessible to any number of online users, the security of web apps is paramount.”

“Most traditional web development languages are interpreted, meaning your web app is a set of files on a server,” continued Perlman. “If someone gains access to that server, they gain access to your source code. Real Studio compiles your web project to binary code so your source code is not stored on the server. In order for someone to alter your application they would have to be very familiar with x86 assembly code and be willing to spend an extremely long time tracing through that code. This is, at the least, an order of magnitude far more difficult than hacking any other web technology source code.”

The Open Web Application Security Project (OWASP) provides information on web application security and recently posted a list of the top 10 web application security issues. Though a few of these issues require the developer to be more diligent, most cannot be used to hack into a web application created with Real Studio.

SQL injection attacks and cross-site scripting remain the most common forms of web app hack attempts. Real Studio provides developers with prepared statement support for database access. This takes the values to be used in a query and sends them separately to the database server so that it can determine if the values are valid or contain SQL. Web applications created with Real Studio can’t be hacked with cross-site scripting because all data sent to the browser is automatically escaped. As a result, the user cannot inject HTML into a page. Also, because the developer doesn't work in HTML or JavaScript, theres no way for the developer to accidentally create this security breach.

Using Real Studio to make web apps is truly unique as you do not need to know numerous web technologies, like HTML, CSS, JavaScript, AJAX, PHP or Java. Instead, Real Studio provides a completely visual, drag and drop interface builder that saves hours of time compared to coding HTML and CSS by hand. Its high-level, object-oriented language allows you to focus on your application’s logic using a single language.

BKeeney’s website receives several thousand website visits per month. In the year that the Web Edition training area has been running it has served up over 3,100 hours of streaming video to about 800 Real Studio users.

About Real Studio Real Studio is a full-featured cross-platform software development tool suited to creating a wide range of applications, from utilities to enterprise-class applications. Real Studio Personal Edition for Windows, Linux or Mac OS X is priced at $99 and is geared for hobbyists and students. Real Studio Professional Edition, required for cross-platform compilation is $299. Real Studio Enterprise Edition, made for full-time developers, is priced at $995 and offers the ability to develop and deploy on Mac OS X, Windows, Linux, and the web. Real Studio Web Edition, the fastest and easiest way to create and deploy web applications, is available for $599.

About Real Software Real Software provides Real Studio, a cross-platform web, desktop, and console development tool. Real Software was founded in 1996 and is based in Austin, Texas. For more information visit www.realsoftware.com or call 866.825.2114.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
SYS-CON Events announced today that delaPlex will exhibit at SYS-CON's @CloudExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. delaPlex pioneered Software Development as a Service (SDaaS), which provides scalable resources to build, test, and deploy software. It’s a fast and more reliable way to develop a new product or expand your in-house team.
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smart...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, discussed the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports.
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
SYS-CON Events announced today that CA Technologies has been named “Platinum Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business – from apparel to energy – is being rewritten by software. From ...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settle...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
SYS-CON Events announced today that Outlyer, a monitoring service for DevOps and operations teams, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Outlyer is a monitoring service for DevOps and Operations teams running Cloud, SaaS, Microservices and IoT deployments. Designed for today's dynamic environments that need beyond cloud-scale monitoring, we make monitoring effortless so you...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend @CloudExpo | @ThingsExpo, June 6-8, 2017, at the Javits Center in New York City, NY and October 31 - November 2, 2017, Santa Clara Convention Center, CA. Learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
Have you ever noticed how some IT people seem to lead successful, rewarding, and satisfying lives and careers, while others struggle? IT author and speaker Don Crawley uncovered the five principles that successful IT people use to build satisfying lives and careers and he shares them in this fast-paced, thought-provoking webinar. You'll learn the importance of striking a balance with technical skills and people skills, challenge your pre-existing ideas about IT customer service, and gain new in...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, Cloud Expo and @ThingsExpo are two of the most important technology events of the year. Since its launch over eight years ago, Cloud Expo and @ThingsExpo have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, I provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading the...
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud enviro...
TechTarget storage websites are the best online information resource for news, tips and expert advice for the storage, backup and disaster recovery markets. By creating abundant, high-quality editorial content across more than 140 highly targeted technology-specific websites, TechTarget attracts and nurtures communities of technology buyers researching their companies' information technology needs. By understanding these buyers' content consumption behaviors, TechTarget creates the purchase inte...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business. Though, IoT is far more complex than most firms expected with a majority of IoT projects having failed. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, Chief IoTologist at Wipro, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology portfolios and business models to adopt and leverage IoT. He will delve in...
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...
There are 66 million network cameras capturing terabytes of data. How did factories in Japan improve physical security at the facilities and improve employee productivity? Edge Computing reduces possible kilobytes of data collected per second to only a few kilobytes of data transmitted to the public cloud every day. Data is aggregated and analyzed close to sensors so only intelligent results need to be transmitted to the cloud. Non-essential data is recycled to optimize storage.