The OpenLook window manager (olwm or olvwm) makes your Linux box look like a Sun workstation. Familiar tools, such as textedit and commandtool, provide some comfort to those who are used to a Sun system. A couple of tips can raise this comfort level even higher.
For example, the Slackware distribution redefines some of the keys across the top of your PC keyboard so that you have the cut, copy, and paste functions that are part of textedit. To see this, examine the .Xmodmap file in your root directory, which is run when olwm starts:
! F1=Help (move pointer on panel, press F1 to show ! help on the item) ! F2=Find (after having selected some text, press F2 ! to do a search) ! F3=Cut (select text, press F3 to move text into ! clipboard) ! F4=Copy (select text, press F4 to copy text into ! clipboard) ! F5=Paste (insert text from clipboard at caret ! position) keysym F1 = Help keysym F2 = F19 keysym F3 = F20 keysym F4 = F16 keysym F5 = F18
So, some of the same functions are available, but with different keys than on the Sun keyboard. But what about that critically necessary key for undo? To get it, add the following to your .Xmodmap file:
! F6=Undo keysym F6 = F14
This change will be implemented the next time you fire up Open Look.
To provide a key (f8 say) to pop up a buried window, add the following to your .Xdefaults file:
This is especially important if you have AutoRaise active, which immediately brings forward the window your cursor is in (In .Xdefaults this is OpenWindows.AutoRaise: True). Now type xrdb .Xdefaults to make the changes immediately.
Does your keyboard have the caps lock key where your Sun has the control key? Do you keep hitting the wrong one? No problem to interchange them–insert the following lines in your xmodmap file (taken from the man page for xmodmap):
! Swap Caps_Lock and Control_L remove Lock = Caps_Lock remove Control = Control_L keysym Control_L = Caps_Lock keysym Caps_Lock = Control_L add Lock = Caps_Lock add Control = Control_L
Do you want to define a meta key? keysym F9=Meta_L placed in the .Xmodmap file will do it. This gives you some flexibility with textedit commands, which are defined also for a meta key combination—meta-x for cut, meta-v for paste, etc. See the man page for textedit for more. This meta key would also be available for emacs. Another option for the meta key is to define it in the Keyboard section of /usr/X11R6/lib/X11/XF86Config (as root, of course):
The XFree86kbd man page describes other keys that can be defined there.
Finally, if you use a Sun machine at work, change the .Xmodmap files on it, so that the function keys at the top of the keyboard are defined the same way on both machines, just in case you get too used to the Linux keyboard layout! This may entail using keycodes rather than keysyms:
keycode 13 = F19 keycode 15 = F20 keycode 17 = F16 keycode 19 = F18 keycode 21 = F14
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- New Container Image Standard Promises More Portable Apps
- The Humble Hacker?
- The Death of RoboVM
- The US Government and Open-Source Software
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- Open-Source Project Secretly Funded by CIA
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide