Solved

Keyboard setup after login

Posted on 1997-07-11
6
188 Views
Last Modified: 2013-12-15
I am looking for a way to configure the keyboard setup in Linux.  I think this maybe handled in one package.  What I want to do is turn on Numlock status and to speed up the keyboard repeat rate and reduce the repeat delay.  Where can I find such a package?
0
Comment
Question by:jdemaa17
6 Comments
 
LVL 1

Expert Comment

by:t2pp
ID: 1628586
Both of these functions are handled by the BIOS. Have a look in your motherboard manual, or press DEL (usually) at boot time to enter the BIOS.
0
 

Author Comment

by:jdemaa17
ID: 1628587
Yes, I've already covered the BIOS options, except Linux overrides them.  What I want is a program or BASH commands that sets/resets the state of the keyboard locks (num,caps,scroll) the way that I want and to speed up the keyboard.  Sorry.
0
 
LVL 1

Expert Comment

by:mgrcnk
ID: 1628588
Are you using X?  Try xmodmap if you are using X.
0
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 
LVL 1

Expert Comment

by:mgrcnk
ID: 1628589
Are you using X?  Try xmodmap if you are using X.
0
 
LVL 2

Accepted Solution

by:
cedric earned 100 total points
ID: 1628590
Hy,
to turn Numlock on : setleds +num
to speed the keyboard : kbdrate -r 30 -d 250
"r" is for speed repetition
"d" is for delay befor repetition

Oh, btw, this is included in most distribution like redhat slacware.
Anyway you can find it in kbd-0.93.tar.gz at sunsite.

byby.
0
 

Author Comment

by:jdemaa17
ID: 1628591
It worked!  Thank you.  I'm sorry about the tardiness, I had to setup other computer things before I could test it.

Jeff D.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension (http://www.experts-exchange.com/discussions/210281/Attachments-with-no-extension.html). This reminded me of questions tha…
The purpose of this article is to demonstrate how we can use conditional statements using Python.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now