Introducing the “Welcome to Xojo” Bundle!

New to Xojo and looking for guidance? We've put together a terrific bundle to welcome you! Xojo Bundle

This bundle includes six back issues of the magazine -- all of year 21 in printed book and digital formats -- plus a one-year subscription (beginning with 22.1) so you'll be learning all about Xojo for the next year. It's the perfect way to get started programming with Xojo. And you save as much as $35 over the non-bundle price!

This offer is only available for a limited time as supplies are limited, so hurry today and order this special bundle before the offer goes away!

Article Preview

Buy Now

Issue 14.3 ('Sunroom')
Instant purchase and download via GumRoad!


App Integrity

Preventing your application from becoming a Trojan Horse

Issue: 14.3 (May/June 2016)
Author: Sam Rowlands
Author Bio: Sam is a pixelMancer and codeWeaver at Ohanaware.
Article Description: No description available.
Article Length (in bytes): 9,964
Starting Page Number: 22
Article Number: 14304
Resource File(s):

Download Icon 14304project.zip Updated: 2016-05-02 11:15:49

Related Link(s): None

Excerpt of article text...

Earlier on this year, Transmission (a popular application used for downloading BitTorrents) was hacked, turned into a Trojan Horse, and re-posted on the publisher's website. The hackers even infiltrated the update system so that the modified version was then automatically downloaded by existing users.

I started a thread on the Xojo forums in an effort to get the community to think about computer security and how we as developers can we reduce the likelihood of becoming transit mechanisms for nefarious purposes.

Below is a quote from Reuters' report on the incident:

Transmission representative John Clay told Reuters via email that the ransomware was added to the disk-image of its software after the project's server was compromised in a cyber attack.

"We're not commenting on the avenue of attack, other than to say that it was our main server that was compromised," he said. "The normal disk image (was) replaced by the compromised one."

...End of Excerpt. Please purchase the magazine to read the full article.