Keyboard capture of F1 and F2 (and others) in Compact Framework

  •        128

How to capture F1 and F2 in Compact Framework on Windows Embedded Handheld 6.5.3



Related Projects

macos-fn-toggle - A macOS app to quickly toggle the behavior of the fn key. programmatically toggles the "Use all F1, F2, etc. keys as standard function keys" option in macOS System Preferences. A task that is tedious when done manually, which especially keyboard-heavy users, such as programmers, tend to do very often.


Quickly toggle function keys on newer Macs between standard PC "F1, F2" mode and the hardware/media controls pictured on them.

pd_getkeys - P.D. code to read key-sequences (e.g. arrow keys, function keys) from the keyboard.

P.D. code to read key-sequences (e.g. arrow keys, function keys) from the keyboard.


SharpKeys is a utility that manages a Registry key that allows Windows to remap one key to any other key. Included in the application is a list of common keyboard keys and a Type Key feature to automatically recognize most keyboard keys. It was originally developed in C# using...

aekii - Tuning an Apple Extended Keyboard II

As a person who spends at least eight hours, five days a week infront of a computer, choosing the correct keyboard is not an easytask. Your hands spend about eight hours a day touching and typingon it. Probably, while you are thinking, your fingers fiddle withthe keys without pressing them. The office's background noise isthose of keys typing. We could say that at least two of your senseshighly notice your keyboard for a huge part of your life.Most people work with cheap 20€ keyboards, but for

MorseWriter - Small app to convert 1 or 2 key presses from morse into text and keyboard-mapped keys

Small app to convert 1 or 2 key presses from morse into text and keyboard-mapped keys

fn-Switch - Little script to switch Function Keys on a Apple Keyboard on and off.

Little script to switch Function Keys on a Apple Keyboard on and off.

Codelobster - Free Portable IDE for PHP/HTML/CSS/JavaScript Development

Codelobster PHP Edition streamlines and simplifies php development process. It provides HTML editor, HTML code inspector, CSS editor, JavaScript editor, PHP editor, PHP debugger and lot more.

impish - An angular.js wrapper for the awesome blueimp photo gallery

// The tag name, Id, element or querySelector of the slides container: slidesContainer: 'div', // The tag name, Id, element or querySelector of the title element: titleElement: 'h3', // The class to add when the gallery is visible: displayClass: 'blueimp-gallery-display', // The class to add when the gallery controls are visible: controlsClass: 'blueimp-gallery-controls', // The class to add when the gallery only displays one element: singleClass: 'blueimp-gallery-


KeyTouch makes it possible to easily configure the extra function keys (like multimedia keys) of your keyboard. You can define which program will be executed while pressing a key. KeyTouch 2 is the first program of its kind that works on kernel 2.6.

privy - An easy, fast lib to correctly password-protect your data

Privy is a small and fast utility for password-protecting secret data such as API keys, cryptocurrency wallets, or seeds for digital signatures.Say for example you are using GnuPG. You are about to sign a message but it first requires your password. Does your password become the input to instantiate your private key? No, it is first hashed by a secure key derivation function. That hash then becomes the input to a symmetric cipher such as AES which then decrypts your stored private key. That is what Privy does.

Application and Global Mouse and Keyboard Hooks .Net Libary in C#

This library allows you to tap keyboard and mouse and to detect and record their activity even when an application is inactive and runs in background.


Free and completely open source keystroke logging (keylogger) application, allows you to capture and record all keyboard input to a log file. Program is extremely small and lightweight, can run in a hidden mode, or upload log file to specified web server.

jmphash - Implementation of the Jump Consistent Hash algorithm in Go.

Implementation of the Jump Consistent Hash algorithm in Go. This algorithm performs consistent hashing on integer keys and maps them to integer buckets.To use jmphash, simply create a Hasher with the number of buckets you want to map to and then call the Hash() function with your key. This function will return the bucket that your key is mapped to.

breadwallet - breadwallet - bitcoin wallet

mode, breadwallet connects directly to the bitcoin network with the fastperformance you need on a mobile device.**the next step in wallet security:**breadwallet is designed to protect you from malware, browser security holes,*even physical theft*. With AES hardware encryption, app sandboxing, keychainand code signatures, breadwallet represents a significant security advance overweb and desktop wallets, and other mobile platforms.**beautiful simplicity:**Simplicity is breadwallet's core design pr


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" ""> <html xmlns=""> <head> <script type="text/javascript" src="raf.js"></script> <script type="text/javascript" src="Paddle.js"></script> <script type="text/javascript" src="ball.js"></script> <script> var paddle; var ball; var brick; var ctx; var canvas; var WIDTH; var HEIGHT; var rightDown = false, leftDown = false; var ballNum = 3;

leveldb - Bitcoin's LevelDB branch

* Keys and values are arbitrary byte arrays. * Data is stored sorted by key. * Callers can provide a custom comparison function to override the sort order. * The basic operations are `Put(key,value)`, `Get(key)`, `Delete(key)`. * Multiple changes can be made in one atomic batch. * Users can create a transient snapshot to get a consistent view of data. * Forward and backward iteration is supported over the data. * Data is automatically compressed using the [Snappy compression library](ht

SoftEther VPN - Cross-platform Multi-protocol VPN Program

SoftEther VPN is a ?Cross-platform Multi-protocol VPN Program. It supports SSL-VPN protocol to penetrate any kinds of firewalls. Ultra-optimized SSL-VPN Protocol of SoftEther VPN has very fast throughput, low latency and firewall resistance. Virtualization of Ethernet devices is the key of the SoftEther VPN architecture. It virtualizes Ethernet devices in order to realize a flexible virtual private network for both remote-access VPN and site-to-site VPN.