Users often find rm (and even rm –i) too unforgiving because this utility removes files irrevocably. Create an alias named delete that moves files specified by its argument(s) into the ~/.trash directory. Create a second alias named undelete that moves a file from the ~/.trash directory into the working directory. Put the following line in your ~/.logout file to remove any files that you deleted during the login session:
/bin/rm -f $HOME/.trash/* >& /dev/null
These commands create the required aliases:
$ alias delete mv \!:\* ~/.trash
$ alias undelete mv ~/.trash/\!:1
Computer Science & Information Technology
You might also like to view...
On the Categorized tab, the same properties are listed, but they are organized by ________ groups
A) Related B) Alphabetized C) Logical D) Sorted
Computer Science & Information Technology
Site selection and work area restrictions are examples of which type of controls used for physical security?
A. Administrative access controls B. Environmental/life safety controls C. Technical controls D. Physical security controls
Computer Science & Information Technology