Solved

Mapping CapsLock to WinKey

Posted on 2012-03-16
2
411 Views
Last Modified: 2012-03-26
I like to use an old (well pre-WinKey) IBM keyboard. What I'd like to do is somehow map the CapsLock key so that it acts as a WinKey.
0
Comment
Question by:iolodev
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 69

Accepted Solution

by:
Callandor earned 500 total points
ID: 37731262
I haven't tried this, but it sounds like it will do what you want: http://caps-lock-changer.lastdownload.com/

Alternatively, you should be able to do it by editing the registry (very dangerous if you don't know what you are doing and make a mistake):
http://vim.wikia.com/wiki/Map_caps_lock_to_escape_in_Windows
0
 

Author Comment

by:iolodev
ID: 37766229
Thanks for the suggestions. I couldn't download the caps-lock-changer because the actual download page wasn't available.

But I did end up editing the registry which did work.
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
disable USB on Dell Printers 14 40
ASA 5512 3 22
Recomended server racks 3 22
GPS For Commercial Vehicles 10 29
Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
The viewer will learn how to successfully create a multiboot device using the SARDU utility on Windows 7. Start the SARDU utility: Change the image directory to wherever you store your ISOs, this will prevent you from having 2 copies of an ISO wit…
The viewer will learn how to successfully download and install the SARDU utility on Windows 7, without downloading adware.

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question