• Home

  • Custom Ecommerce
  • Application Development
  • Database Consulting
  • Cloud Hosting
  • Systems Integration
  • Legacy Business Systems
  • Security & Compliance
  • GIS

  • Expertise

  • About Us
  • Our Team
  • Clients
  • Blog
  • Careers

  • VisionPort

  • Contact
  • Our Blog

    Ongoing observations by End Point Dev people

    Getting started with Heroku

    Marina Lohova

    By Marina Lohova
    February 7, 2013

    It’s becoming increasingly popular to host applications with a nice cloud-based platform like Engine Yard or Heroku.

    Here is a little guide showing how to join the development of a Heroku-based project. In Heroku terms it’s called “collaborating on the project”. The official tutorial does provide answers to most of the questions, but I would like to enhance it with my thoughts and experiences.

    First essential question: how to get your hands on the app source code?

    I wish Heroku had something like devcamps service provided, so you wouldn’t need to experience the hassle of launching the application locally, dealing with the database and system processes needed for development. With Heroku the code does need to be cloned to the local environment like this:

    $ heroku git:clone --app my_heroku_app
    

    Second, how to commit the changes?

    I got this error when trying to push to the repository:

    ! Your key with fingerprint xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx is not authorized
    to access my_heroku_app.
    fatal: The remote end hung up unexpectedly
    

    Turned out I needed to add the new identity to my local machine.

    Also, if you previously had accounts with Heroku with different email address, …


    cloud hosting

    Install SSL Certificate from Network Solutions on nginx

    Brian Buchalter

    By Brian Buchalter
    February 5, 2013

    Despite nginx serving pages for 12.22% of the web’s million busiest sites, Network Solutions does not provide instructions for installing SSL certificates for nginx. This artcle provides the exact steps for chaining the intermediary certificates for use with nginx.

    Chaining the Certificates

    Unlike Apache, nginx does not allow specification of intermediate certificates in a directive, so we must combine the server certificate, the intermediates, and the root in a single file. The zip file provided from Network Solutions contains a number of certificates, but no instructions on the order in which to chain them together. Network Solutions’ instructions for installing on Apache provide a hint, but let’s make it clear.

    cat your.site.com.crt UTNAddTrustServer_CA.crt NetworkSolutions_CA.crt > chained_your.site.com.crt
    

    This follows the general convention of “building up” to a trusted “root” authority by appending each intermediary. In this case UTNADDTrustServer_CA.crt is the intermediary while NetworkSolutions_CA.crt is the parent authority. With your certificates now chained together properly, use the usual nginx directives to configure SSL.

    listen                 443;
    ssl …

    hosting tls

    jQuery Performance Tips: Slice, Filter, parentsUntil

    Steph Skardal

    By Steph Skardal
    February 4, 2013

    I recently wrote about working with an intensive jQuery UI interface to emulate highlighting text. During this work, I experimented with and worked with jQuery optimization quite a bit. In the previous blog article, I mentioned that in some cases, the number of DOM elements that I was traversing at times exceeded 44,000, which caused significant performance issues in all browsers. Here are a few things I was reminded of, or learned throughout the project.

    • console.profile, console.time, and the Chrome timeline are all tools that I used during the project to some extent. I typically used console.time the most to identify which methods were taking the most time.
    • Caching elements is a valuable performance tool, as it’s typically faster to run jQuery calls on a cached jQuery selector rather than reselecting the elements. Here’s an example:
    Slower Faster
    //Later in the code
    $('.items').do_something();
    
    //On page load
    var cached_items = $('.items');
    //Later in the code
    cached_items.do_something();
    
    Slower Faster
    $('.highlighted');
    
    cached_items.filter('.highlighted');
    

    javascript jquery rails

    How to Apply a Rails Security Patch

    Brian Buchalter

    By Brian Buchalter
    January 29, 2013

    With the announcement of CVE-2013-0333, it’s time again to secure your Rails installation. (Didn’t we just do this?) If you are unable to upgrade to the latest, secure release of Rails, this post will help you apply a Rail security patch, using CVE-2013-0333 as an example.

    Fork Rails, Patch

    The CVE-2013-0333 patches so kindly released by Michael Koziarski are intended for use with folks who have forked the Rails repository. If you are unable to keep up with the latest releases, a forked repo can help you manage divergences and make it easy to apply security patches. Unfortunately, you cannot use wget to download the attached patches directly from Google Groups, so you’ll have to do this in the browser and put the patch into the root of your forked Rails repo. To apply the patch:

    cd $RAILS_FORK_PATH
    git checkout $RAILS_VERSION
    # Download attachment from announcement in browser, sorry no wget!
    git am < $CVE.patch
    

    You should see the newly committed patch(es) at the HEAD of your branch. Push out to GitHub and then bundle update rails on your servers.

    Patching without Forks

    If you are in the unfortunate case where there have been modifications or patches applied informally outside …


    rails security

    Evading Anti-Virus Detection with Metasploit

    Brian Buchalter

    By Brian Buchalter
    January 28, 2013

    This week I attended a free, technical webinar hosted by David Maloney, a Senior Software Engineer on Rapid7’s Metasploit team, where he is responsible for development of core features for the commercial Metasploit editions. The webinar was about evading anti-virus detection and covered topics including:

    • Signatures, heuristics, and sandboxes
    • Single and staged payloads
    • Executable templates
    • Common misconceptions about encoding payloads
    • Dynamically creating executable templates

    After Kaspersky Lab broke news of the “Red October” espionage malware package last week, I thought this would be an interesting topic to learn more about. In the post, Kaspersky is quoted saying, “the attackers managed to stay in the game for over 5 years and evade detection of most antivirus products while continuing to exfiltrate what must be hundreds of terabytes by now.”

    Separating Exploits and Payloads

    Vocabulary in the world of penetration testing may not be familiar to everyone, so let’s go over a few terms you may see.

    • Vulnerability: A bug or design flaw in software that can be exploited to allow unintended behavior
    • Exploit: Software which takes advantage of a vulnerability allowing arbitrary …

    security

    JavaScript-driven Interactive Highlighting

    Steph Skardal

    By Steph Skardal
    January 25, 2013


    An example of highlighted text, by sergis on Flickr

    One project I’ve been involved in for almost two years here at End Point is the H2O project. The Ruby on Rails web application behind H2O serves as a platform for creating, editing, organizing, consuming and sharing course materials that is used by professors and their students.

    One of the most interesting UI elements of this project is the requirement to allow highlighting and annotating text interactively. For example, when one reads a physical textbook for a college course, they may highlight and mark it up in various ways with different colors and add annotated text. They may also highlight a section that is particularly important for an upcoming exam, or they may highlight another section with a different color and notes that may be needed for a paper.

    The H2O project has required support for digitizing interactive highlighting and annotating. Since individual text is not selectable as a DOM element, each word is wrapped into an individual DOM element that is selectable, hoverable, and has DOM properties that we can assign it. For example, we have the following text:

    The cow jumped over the moon.

    Which is manipulated to …


    jquery javascript performance

    Create a key pair using SSH on Windows

    Bianca Rodrigues

    By Bianca Rodrigues
    January 24, 2013

    I recently joined End Point as a full-time employee after interning with the company since August 2012. I am part of the marketing and sales team, working out of the New York City office.

    One of the frequent queries we receive from our non-technical clients is how to create an SSH key pair. This post is an introduction to using SSH on Windows for anyone who needs some clarification on this network protocol.

    SSH stands for Secure Shell, which is used to provide secure access to remote systems. PuTTY is an SSH client that is available for Windows. Using the concept of “key-based” SSH logins, you can avoid the usual username/password login procedure, meaning only those with a valid private/public key pair can log in. This allows for a more secure system.

    To begin, install PuTTYgen, PuTTY and Pageant on your Windows system:

    Let’s focus on PuTTYgen – used to create a private/public key pair.

    1. After downloading PuTTYgen, run puttygen.exe
    2. In the “Parameters” — “Type of key” section, make sure “SSH-2 RSA” is selected:

    *Note: SSH-2 RSA is what End Point recommends. The others work as well, and your business may have some reason to use them instead. …


    security

    CSS sprites: The easy way?

    Richard Templet

    By Richard Templet
    January 21, 2013

    I’ve always been interested in the use of CSS sprites to speed up page load times. I haven’t had a real chance to use them yet but my initial reaction was that sprites would be quite painful to maintain. In my mind, you would have to load up the sprite into Gimp or Photoshop, add the new image and then create the css with the right coordinates to display the image. Being a guy with very little image editing skills, I felt that managing multiple images frequently would be quite time consuming. Recently, I was dealing with some page load times for a client and the use of sprites for the product listing pages came up as an option to speed them up. I knew the client wouldn’t have time to create sprites for this so I went searching for a command line tool that would allow me to create sprites. I was quite happy when I stumbled upon Glue.

    Glue is free program that will take a directory of images and create a png sprite and a css file with the associated CSS classes. It has a ton of useful options. A few of the ones I thought were handy was being able to prefix the path to the image with a url instead of a relative path, being able to downgrade the png format to png8 to make the file …


    css performance tools
    Previous page • Page 125 of 219 • Next page