Mouse gestures and keyboard shortcuts with KHotKeys
A Game of Signs
Mouse gestures and keyboard shortcuts
add speed and simplicity to PC
operations. Mouse gestures used to
be the domain of Opera and Mozilla
users,but KHotKeys now brings them
to Konqueror for users of KDE 3.2 or
newer.You can even launch non-KDE
programs with KHotKeys.
KDE is an extremely flexible system.
The context menus that drop
down when users press the right
mouse button are just as extensible
as the K menu or the quick start icons.
And hiding in the depths of the KDE
control center is another interesting program
that allows more flexible use of
KDE: KHotKeys. With KHotKeys, the
user can assign keyboard combinations
to applications. You can even use
mouse gestures to control Konqueror
(see Box 1).
To launch KHotKeys, press [Alt-F2]
and enter khotkeys, or open the Control
Center and open the Regional & Accessibility
section. When you launch
KHotKeys, a warning message appears to
inform you that changes can be dangerous.
This article gives you an introduction
to some simple but effective settings
within the KHotKeys application. It
always helps to be careful, but you will
have few worries about these changes,
even if you are a newcomer to KHotkeys.
Once you become accustomed to
KHotkeys, you will have your own ideas
for hot keys and gestures that will
increase the efficiency of your desktop.
Buy this article as PDF
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm