Solved

Locking and unlocking the keyboard and mouse through java

Posted on 2001-07-31
4
1,152 Views
Last Modified: 2008-02-01
Hi.
I want to write a java program to lock and unlock the keyboard and mouse on winNT  using the java program. Please help me to do this. Atleast give me an idea how to proceed so that i can reach my goal.  
regards
Manish
0
Comment
Question by:m_ralekar
4 Comments
 
LVL 92

Assisted Solution

by:objects
objects earned 100 total points
ID: 6337247
DOn't know of any pure Java way of doing that.
You'll need to use JNI or some other native implementation.
0
 
LVL 3

Accepted Solution

by:
shyamkumarreddy earned 100 total points
ID: 6337258
Hey Ralekar

You Need a JNI is that is sure.
But i want to bring you a notice abt something regarding this.

If u still can implement this, but not all OS I mean even in Windows u can do this.

You can Lock your ur devices in 3.2,95,98
I know u cann't do it with Win2000 and not much i know abt NT.

Microsoft has removed a device control in 2000. In order to use this feature. U need to reboot the system to take place. This is special feature in 2000.

I don't know abt NT.
This is for your information

Shyam

0
 

Author Comment

by:m_ralekar
ID: 6339780
Hi . .
Can u tell me any native implementation for this. If u r having any native program to do it please send it to me it will be very much helpful to me.
Thank you.
0
 
LVL 14

Expert Comment

by:sudhakar_koundinya
ID: 9025716
No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:


[split points between shyamkumarreddy and objects]


Please leave any comments here within the next seven days.
 
PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!
 
sudhakar_koundinya
EE Cleanup Volunteer
---------------------
If you feel that your question was not properly addressed, or that none of the comments received were appropriate answers, please post your concern in THIS thread.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

For customizing the look of your lightweight component and making it look opaque like it was made of plastic.  This tip assumes your component to be of rectangular shape and completely opaque.   (CODE)
For beginner Java programmers or at least those new to the Eclipse IDE, the following tutorial will show some (four) ways in which you can import your Java projects to your Eclipse workbench. Introduction While learning Java can be done with…
Viewers learn about the third conditional statement “else if” and use it in an example program. Then additional information about conditional statements is provided, covering the topic thoroughly. Viewers learn about the third conditional statement …
Viewers learn about the “while” loop and how to utilize it correctly in Java. Additionally, viewers begin exploring how to include conditional statements within a while loop and avoid an endless loop. Define While Loop: Basic Example: Explanatio…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now