Users often find rm (and even rm –i) too unforgiving because this utility removes files irrevocably. Create an alias named delete that moves files specified by its argument(s) into the ~/.trash directory. Create a second alias named undelete that moves a file from the ~/.trash directory into the working directory. Put the following line in your ~/.logout file to remove any files that you deleted during the login session:

/bin/rm -f $HOME/.trash/* >& /dev/null

These commands create the required aliases:
$ alias delete mv \!:\* ~/.trash
$ alias undelete mv ~/.trash/\!:1

Computer Science & Information Technology

You might also like to view...

On the Categorized tab, the same properties are listed, but they are organized by ________ groups

A) Related B) Alphabetized C) Logical D) Sorted

Computer Science & Information Technology

Site selection and work area restrictions are examples of which type of controls used for physical security?

A. Administrative access controls B. Environmental/life safety controls C. Technical controls D. Physical security controls

Computer Science & Information Technology