Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Active Window Tracking

Posted on 2001-06-28
3
Medium Priority
?
444 Views
Last Modified: 2012-08-14
In NT 4.0 Workstation we were able to make window tracking like X-Windows i.e. the active window is where the mouse is only. You don't have to click on a window to make it active and respond to keyboard input. The registry setting used to be in HKEY_CURRENT_USER\Control Panel\Mouse and the name was ActiveWindowTracking and you change the value from 0 to 1 for this to happen. In Windows 2000 this doesn't work. Does anybody know how to get the window to become active based only on mouse location and not clicking? Thanks.

-- Pakfan
0
Comment
Question by:Pakfan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 44

Accepted Solution

by:
CrazyOne earned 1200 total points
ID: 6236730
If you don't have it download Tweak and Xmouse
http://www.microsoft.com/ntworkstation/downloads/PowerToys/Networking/NTTweakUI.asp

After you have it installed both programs launch Tweak and go to the "Mouse" tab and look near the bottom for "Activation follows Mouse (X-Mouse)".


The Crazy One
0
 

Author Comment

by:Pakfan
ID: 6236756
Perfect! Thank you!

-- Pakfan
0
 
LVL 44

Expert Comment

by:CrazyOne
ID: 6236763
Your Welcome glad I could help. :>)
0

Featured Post

How Blockchain Is Impacting Every Industry

Blockchain expert Alex Tapscott talks to Acronis VP Frank Jablonski about this revolutionary technology and how it's making inroads into other industries and facets of everyday life.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
In this article, I’ll show how research, determination, and use of modern technology helped me solve a DNA mystery.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

722 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question