Install TinyMCE in MovableType

The process of installing TinyMCE text editor in MovableType is quite easy and it does not take more than 2 minutes.

The easyest way to do it is to download the TinyMCE plugin from here:

Then extract the archive and upload the contents of mt-static in your static mt folder and the folder plugins in your home folder for movable type installation.

All done, next time you choose Rich Text format to edit your entries you’ll have TinyMCE at your disposal.

Export RSA Private keys from Putty to OpenSSH

If you want to move your access keys generated with putty to OpenSSH you probably noticed that they are in a different format. In order to convert them follow the steps:

puttygen supports exporting to an OpenSSH compatible format.

  1. Open PuttyGen
  2. Click Load
  3. Load your private key
  4. Go to Conversions->Export OpenSSH and export your private key
  5. Copy your private key to ~/.ssh/id_dsa (or id_rsa).
  6. Create the RFC 4716 version of the public key using ssh-keygen

    ssh-keygen -e -f ~/.ssh/id_dsa > ~/.ssh/

  7. Convert the RFC 4716 version of the public key to the OpenSSH format:

    ssh-keygen -i -f ~/.ssh/ > ~/.ssh/

Source: Stack question

OpenVPN setup on VPS

I will quickly describe how I managed to get a VPN ready for my needs.
Note: at this point I was not able to bypass NAT setups but I will find some tweaks for that.

First if your fainthearted you should probably not mess that much with config files and try the solution explained here which provides a more user friendly approach.

The journey starts by installing the server on your VPS, from now on I assume you have a yum-based server (I run CentOS 6).
First enable RMP Forge repo, to get the latest OpenVPN packages:

yum localinstall –nogpgcheck (for x86)

Then trigger the installation

yum install openvpn

Enable TUN/TAP from your VPS Control Panel and check if it’s working by:

# cat /dev/net/tun

You should get:

# cat: /dev/net/tun: File descriptor in bad state

Now go ahead and take the key and certificate generators and start building keys and certificates:

# cd /usr/share/doc/openvpn-2.0.9
# cp -av easy-rsa /etc/openvpn/
# cd /etc/openvpn/easy-rsa/

Fill the requested info or type a dot (".") to leave it empty:
# . ./vars # sh clean-all # sh build-ca # sh build-key-server server

Now that you have the server key and the certificate, build some client keys:

# sh build-key client1 # sh build-key client2

And fire up the security policies:

# sh build-dh

When you have the certificates and keys generated get the client .crt and .key plus the ca.crt files and transfer them to your clients.

Now take a configuration template and edit the configuration file:

# cd /etc/openvpn/ # cp /usr/share/doc/openvpn-2.2.2/sample-config-files/server.conf . // be aware of the version number as it will increase in the future # nano server.conf

My working configuration is as follows:

local <public IP of the local server>
port 80
proto tcp
dev tun
ca ca.crt
cert server.crt
key server.key # This file should be kept secret
dh dh1024.pem
ifconfig-pool-persist ipp.txt
push "route"
push "dhcp-option DNS"
push "dhcp-option DOMAIN <domain name>"
keepalive 10 120
user nobody
group nobody
status openvpn-status.log
log openvpn.log
verb 3
mute 10

Adjust the configuration to your needs.

My Linux workstation setup

I made this article to gather a list of the tools I use, and I strive to update it as often as possible. It’s main purpose is for me to have a quick reference over the tools and configurations I need to setup whenever I have to get a new system customized.

Since I was mostly around Gnome-based environments I use quite a few Gnome-based software.
Internet & Browsing:
LibreOffice Pack usually I need just Writer, Impress and Calc
PDF Shuffeler
Multimedia: – VLC
Gnome Subtitles
Server Maintance:
Eclipse IDE,
Eclipse + PDT,
MySQL Workbench
Chat & Communication:
GcStart Collection Manager