Mouse gestures and keyboard shortcuts with KHotKeys
A Game of Signs
Mouse gestures and keyboard shortcuts
add speed and simplicity to PC
operations. Mouse gestures used to
be the domain of Opera and Mozilla
users,but KHotKeys now brings them
to Konqueror for users of KDE 3.2 or
newer.You can even launch non-KDE
programs with KHotKeys.
KDE is an extremely flexible system.
The context menus that drop
down when users press the right
mouse button are just as extensible
as the K menu or the quick start icons.
And hiding in the depths of the KDE
control center is another interesting program
that allows more flexible use of
KDE: KHotKeys. With KHotKeys, the
user can assign keyboard combinations
to applications. You can even use
mouse gestures to control Konqueror
(see Box 1).
To launch KHotKeys, press [Alt-F2]
and enter khotkeys, or open the Control
Center and open the Regional & Accessibility
section. When you launch
KHotKeys, a warning message appears to
inform you that changes can be dangerous.
This article gives you an introduction
to some simple but effective settings
within the KHotKeys application. It
always helps to be careful, but you will
have few worries about these changes,
even if you are a newcomer to KHotkeys.
Once you become accustomed to
KHotkeys, you will have your own ideas
for hot keys and gestures that will
increase the efficiency of your desktop.
Buy this article as PDF
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.