?
Solved

control-L does not work

Posted on 2006-07-11
4
Medium Priority
?
323 Views
Last Modified: 2013-12-16
Can anyone show me how to make control-L key combination clear the screen.  It works on my other computers but in this configuration it is not working for some reason.

If anyone knows a few things to check that's all I really am looking for.
0
Comment
Question by:bryanlloydharris
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 22

Accepted Solution

by:
pjedmond earned 800 total points
ID: 17086832
Ctrl-L works for me with my Putty connection quite happily. Things to check:

1.   Terminal emulation.
2.   Screen transalation character set
3.   Key trsalations (xmodmap) if an Xterm
4.   loadkeys and the keyboard map /lib/kdb/keymaps

(   (()
(`-' _\
 ''  ''
0
 
LVL 3

Author Comment

by:bryanlloydharris
ID: 17088131
ah ... maybe it's because I used dvorak?

at the terminal once I probably did this: loadkeys dvorak/dvorak.  Would that do it?

Also some more information: it works fine from home (using putty) but not from work(using the ssh client from slackware 10.2).  Any thoughts on this extra info?
0
 
LVL 22

Expert Comment

by:pjedmond
ID: 17088951
Possibly? - From what you've said, it sounds as if your setup is fine, and the problem is the slackware 10.2 setup. Have a look in the .bashrc/.bashprofile files for anything unusual. Also check whether there are any . files in the home directory that may relae to a keboard change (.kb files). This is on the Suse system.

(   (()
(`-' _\
 ''  ''
0
 
LVL 3

Author Comment

by:bryanlloydharris
ID: 17093814
Thanks for all the help.  I'll go ahead and close this out and keep at it.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension (http://www.experts-exchange.com/discussions/210281/Attachments-with-no-extension.html). This reminded me of questions tha…
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial
Suggested Courses
Course of the Month10 days, 4 hours left to enroll

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question