?
Solved

How to create Key maps on Tera Term

Posted on 2009-02-18
2
Medium Priority
?
2,770 Views
Last Modified: 2012-06-21
How do I create Key Maps on Tera Term? Such as if I want to have keyboard shortcuts.


Thank You
0
Comment
Question by:vreyesii
2 Comments
 
LVL 23

Accepted Solution

by:
Mysidia earned 1000 total points
ID: 23677740
See here:
http://ttssh2.sourceforge.jp/manual/en/setup/keyboard.html
http://ttssh2.sourceforge.jp/manual/en/reference/keycode.txt

For info about  making a Keyboard setup file.

There are sample files included with tera term.

I suggest copying one of the sample files  to a custom filename,
then apply the edits you desire

Start tera term from a command prompt, and use
the /K=(keyboard setup filename)  
as described here:
http://ttssh2.sourceforge.jp/manual/en/commandline/teraterm.html

0
 

Author Comment

by:vreyesii
ID: 23692278
Thank You it worked.
0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
Considering today’s continual security threats, which affect Information technology networks and systems worldwide, it is very important to practice basic security awareness. A normal system user can secure himself or herself by following these simp…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses
Course of the Month17 days, 9 hours left to enroll

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question