The process of installing TinyMCE text editor in MovableType is quite easy and it does not take more than 2 minutes.
The easyest way to do it is to download the TinyMCE plugin from here: http://plugins.movabletype.org/tinymce/
Then extract the archive and upload the contents of mt-static in your static mt folder and the folder plugins in your home folder for movable type installation.
All done, next time you choose Rich Text format to edit your entries you’ll have TinyMCE at your disposal.
If you want to move your access keys generated with putty to OpenSSH you probably noticed that they are in a different format. In order to convert them follow the steps:
puttygen supports exporting to an OpenSSH compatible format.
- Open PuttyGen
- Click Load
- Load your private key
- Go to
Conversions->Export OpenSSH and export your private key
- Copy your private key to
Create the RFC 4716 version of the public key using
ssh-keygen -e -f ~/.ssh/id_dsa > ~/.ssh/id_dsa_com.pub
Convert the RFC 4716 version of the public key to the OpenSSH format:
ssh-keygen -i -f ~/.ssh/id_dsa_com.pub > ~/.ssh/id_dsa.pub
Source: Stack question
I will quickly describe how I managed to get a VPN ready for my needs.
Note: at this point I was not able to bypass NAT setups but I will find some tweaks for that.
First if your fainthearted you should probably not mess that much with config files and try the solution explained here which provides a more user friendly approach.
The journey starts by installing the server on your VPS, from now on I assume you have a yum-based server (I run CentOS 6).
First enable RMP Forge repo, to get the latest OpenVPN packages:
yum localinstall –nogpgcheck http://pkgs.repoforge.org/rpmforge-release/rpmforge-release-0.5.2-2.el6.rf.i686.rpm (for x86)
Then trigger the installation
yum install openvpn
Enable TUN/TAP from your VPS Control Panel and check if it’s working by:
# cat /dev/net/tun
You should get:
Now go ahead and take the key and certificate generators and start building keys and certificates:
# cd /usr/share/doc/openvpn-2.0.9
# cp -av easy-rsa /etc/openvpn/
# cd /etc/openvpn/easy-rsa/
Fill the requested info or type a dot (".") to leave it empty:
# . ./vars
# sh clean-all
# sh build-ca
# sh build-key-server server
Now that you have the server key and the certificate, build some client keys:
# sh build-key client1
# sh build-key client2
And fire up the security policies:
# sh build-dh
When you have the certificates and keys generated get the client .crt and .key plus the ca.crt files and transfer them to your clients.
Now take a configuration template and edit the configuration file:
# cd /etc/openvpn/
# cp /usr/share/doc/openvpn-2.2.2/sample-config-files/server.conf . // be aware of the version number as it will increase in the future
# nano server.conf
My working configuration is as follows:
local <public IP of the local server>
key server.key # This file should be kept secret
server 10.8.0.0 255.255.255.0
push "route 127.0.0.0 255.255.255.0"
push "dhcp-option DNS 126.96.36.199"
push "dhcp-option DOMAIN <domain name>"
keepalive 10 120
Adjust the configuration to your needs.
I made this article to gather a list of the tools I use, and I strive to update it as often as possible. It’s main purpose is for me to have a quick reference over the tools and configurations I need to setup whenever I have to get a new system customized.
Since I was mostly around Gnome-based environments I use quite a few Gnome-based software.
Internet & Browsing:
LibreOffice Pack usually I need just Writer, Impress and Calc
Multimedia: – VLC
Eclipse + PDT,
Chat & Communication:
GcStart Collection Manager