The "Generate" button will allow you to generate the replacement code based on the keyboard mapping choices you have made (whilst in this browser session). If this is the case, the Keyboard mapper should show an additional button: If this is the case, you will be able to access the host with: localhost/FVTerm (You can configure as many key actions in a session as you need / require).Īny of the above changes will need to be made whilst on the Flynet server itself. They do not affect the server settings and will not be available to you if you use a different browser or machine to access FVTerm. Your settings are stored locally on the machine you are currently using. “Reset Keys” will return the key actions to those defined on the server. In this case, Clear (clear screen) has been selected for Ctrl-L and as there are changes to save the “Save Changes” button appears. In this case (using the drop-down list) Ctrl-L (control and L) is being changed to send Clear Screen to the host: This will bring up the Keyboard Mapping tool:Ģ.Ĝlicking on a key on the graphical representation of the keyboard will scroll the keys list to that key’s entry.ģ.Ěctions can be modified/chosen for the native key, shift, Alt or Control. This will not work correctly unless you are connected to a host. The active keyboard configuration may be viewed by clicking on the keyboard edit icon: (Most of the above environmental specifics should be provided by your system administrator before starting this guide.)ġ. For server-side configuration (to set default key mapping for everyone server-side) you will need access to the Flynet Server with administrator privileges.For client configuration very little security is required.Internet Explorer 7 or above or some other browser running on a computer that has access to the above.An existing installation of Flynet Viewer Server, configured and working.These may be, for example, you would like or need the control and L key combination to clear the screen, or possibly your host needs Control-D to logoff, these actions can be configured.Įnd User or Operations or support, installation, or sysops staff.īefore starting, the following components are required: If your host, operating system, or application requires certain actions to apply to keys, this document will take you through the process of defining such actions.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |