How do I delete my commands quickly?

1

1

Decide how far back you want to check your unread emails for important messages you might have missed. This will depend on how much time you have to spend on the project, and how fast your unread email tends to accumulate. 1 to 3 months is a good rule of thumb. If the email is older than that, either it was important enough that the sender will try to reach you again, or it no longer matters. For illustration, let's choose a date of March 13, 2015.

2

Type "in:inbox before:2015/03/13" (use whatever date you have chosen) in the search box, and click "Search". The format of the date is important. It must be in the form YYYY/MM/DD, with all 4 digits of the year listed first, then the month with two digits, and finally the date with two digits.

3

Select all of these messages by clicking "All" then "Select all conversations that match this search", just like you did above.

4

Take a deep breath, and click "Delete" to remove...

0 0
2
H

ow do I delete a file under Linux / UNIX / BSD / AIX / HP-UX operating system using command line options?


To remove a file or directory in Linux, FreeBSD, Solaris or Unix-like operating systems use the rm command or unlink command.

rm command syntax

rm (short for remove) is a Unix / Linux command which is used to delete files from a filesystem. Usually, on most filesystems, deleting a file requires write permission on the parent directory (and execute permission, in order to enter the directory in the first place). The syntax is as follows to delete the specified files and directories:

rm {file-name}
rm [options] {file-name}
unlink {file-name}
rm -f -r {file-name}

Where,

-f: Forcefully remove file -r: Remove the contents of directories recursively

When rm command used just with the file names, rm deletes all given files without confirmation by the user.

Remove or Delete a File Example

To remove...

0 0
3
Shortcut Description Command-B Boldface the selected text, or turn boldfacing on or off. Command-I Italicize the selected text, or turn italics on or off. Command-U Underline the selected text, or turn underlining on or off. Command-T Show or hide the Fonts window. Command-D Select the Desktop folder from within an Open dialog or Save dialog. Control-Command-D Show or hide the definition of the selected word. Shift-Command-Colon (:) Display the Spelling and Grammar window. Command-Semicolon (;) Find misspelled words in the document. Option-Delete Delete the word to the left of the insertion point. Control-H Delete the character to the left of the insertion point. Or use Delete. Control-D Delete the character to the right of the insertion point. Or use Fn-Delete. Fn-Delete Forward delete on keyboards that don't have a Forward Delete key. Or use Control-D. Control-K Delete the text between the insertion point and the end of the line or paragraph. Command-Delete...
0 0
4

Microsoft Windows
MS-DOS and Windows command line
Linux, Unix, and variant
Mac OS
Microsoft Windows 3.X

How to delete files in Microsoft Windows

Microsoft Windows users can delete a file or folder (directory) using many different methods. Below are the more common methods for deleting a file or folder.

Note: Users not familiar with Windows should realize that if you delete a folder, it will delete all the files and folders within that folder.

Tip: The steps below are for deleting a single file or folder. However, the same steps can be applied to delete multiple files or folders if you select several of them first.

Delete key

The easiest way to delete files and folders is to locate the item you want to delete, highlight it by clicking on the file or folder once, and then press the delete key on the keyboard. You can browse to the location of the file or folder using either My Computer or Windows Explorer.

Tip:...

0 0
5

Multiple windows
ctags
Command line options
Mapping keystrokes

What is vim?

An excellent text editor.

How can I effectively use vim?

I need to complete this part.

How can I read the help file for a particular feature?

What are the available modes?

Command Mode: You type command without using the colon. From insert mode, to get back to command mode, press the escape key. Ex Mode Insert Mode

When you starts vim, it is in command mode. This is the mode where you can execute vim commands (commands that do not start with a colon). Before you can type text into your document, you must switch to the insert mode by typing the lowercase letter i. From the insert mode, to get back to command mode, press the escape key.

The Ex Mode is another mode where you can enter commands. These commands are known as Ex commands. To enter an Ex command, from command mode, press the colon key.

How does vim handle delete...

0 0
6

Windows 10 includes a variety of universal apps, and there’s no easy way to hide them from the “All Apps” view in the new Start menu. You can uninstall them, but Microsoft doesn’t allow you to easily uninstall them in the usual way.

You probably don’t want to do this. These apps take up very little space on your device so it’s best to just ignore them if you don’t want to use them. But, if you really want to uninstall them, you can. If you’ve already uninstalled included apps, you can get them all back with a single command.

Uninstall the App Normally

Some apps allow you to uninstall them in the normal way. Just right-click an app in the All Apps list in the Start menu and select “Uninstall”. (On a touch screen, long-press the app instead of right-clicking.)

This trick appears to work for the included Get Office, Get Skype, Get Started, Microsoft Solitaire Collection, Money, News, Phone Companion, and Sports apps. You can also uninstall...

0 0
7

The fastest way to delete pictures from your iPhone's camera roll is to go to the "Moments" section in your Photos app and use the select button to delete whole days at a time. In your Photos app, go to Years -> Collections -> Moments and tap the "Select" button in the top right. Now you can select a whole day with another select button, or individual pics from within a day by tapping on each photo. When you have selected everything you want to delete tap the trash icon.

That is the fastest way to do it from your iPhone, but if you want to remove many hundreds or thousands of photos, you're better off doing it on your Mac or pc. On your Mac, connect your iPhone with your lightning cable and use iPhoto to import your photos. Use your mouse to select your photos and then click "Import Selected," or you can import all the photos. Once you click one of these buttons it will ask you if you want to delete them from your iPhone once they are imported.

Other methods for...

0 0
8

In Windows, files/folders have a special attribute called hidden attribute. By setting this attribute, we can hide files from being displayed in explorer or command prompt. This article explains how to list this hidden files in windows command line and it also discusses how to delete the hidden files.

To get the list of hidden files from a directory you can run the below command.

dir directory_path /A:H /B

Example:

Get the list of hidden files from C:\Windows\system32 folder.

C:\>dir c:\WINDOWS\system32 /A:H /B cdplayer.exe.manifest dllcache GroupPolicy logonui.exe.manifest ncpa.cpl.manifest nwc.cpl.manifest sapi.cpl.manifest WindowsLogon.manifest wuaucpl.cpl.manifest

To get the list of hidden files from all sub directories we need to add /S switch to the command.

dir directory_path /A:H /S /B

Example:
To get the list of hidden files from the folder c:\windows\system32 and from all its subfolders we need to run the below command.

dir...
0 0
9
...
0 0
10
sudo apt-get install xbindkeys

Xbindkeys is a very versatile program that lets you remap keys very easily. It uses a config file, my default located in your home directory, to change key bindings into certain commands.

To create a default config file you use the command:

xbindkeys --defaults

Which prints the default config file. So if you want to create the file containing the default values you would use:

xbindkeys --defaults > $HOME/.xbindkeysrc

Which prints the default values into a hidden file named .xbindkeysrc located in home (~).

Now to actually change the bindings of keys we first need to know what the name or keysym of those keys is. xbindkeys allows us to use the -k handle to find the name of a key or key combination. Run:

xbindkeys -k

And press a key or key combination. Your output will look something similar to this (when pressing space):

"NoCommand" m:0x10 + c:65 Mod2 + space

"No Command" tells us that currently no command is...

0 0
11
By: Edgewood Solutions | Read Comments (14) | Related Tips: 1 | 2 | More > T-SQL
Problem

There are two main keywords used for deleting data from a table: TRUNCATE and DELETE. Although each achieves the same result, the methods employed for each vastly differ. There are advantages, limitations, and consequences of each that you should consider when deciding which method to use.

Solution

Deleting Data Using TRUNCATE TABLE

TRUNCATE TABLE is a statement that quickly deletes all records in a table by deallocating the data pages used by the table. This reduces the resource overhead of logging the deletions, as well as the number of locks acquired; however, it bypasses the transaction log, and the only record of the truncation in the transaction logs is the page deallocation. Records removed by the TRUNCATE TABLE statement cannot be restored. You cannot specify a WHERE clause in a TRUNCATE TABLE statement, it is all or nothing. The advantage to using...

0 0
12

OpenSSL Command-Line HOWTO

The openssl application that ships with the OpenSSL libraries can perform a wide range of crypto operations. This HOWTO provides some cookbook-style recipes for using it.

Paul Heinlein | February 24, 2016

The openssl command-line binary that ships with the OpenSSL libraries can perform a wide range of cryptographic operations. It can come in handy in scripts or for accomplishing one-time command-line tasks.

Documentation for using the openssl application is somewhat scattered, however, so this article aims to provide some practical examples of its use. I assume that you’ve already got a functional OpenSSL installation and that the openssl binary is in your shell’s PATH.

Just to be clear, this article is strictly practical; it does not concern cryptographic theory and concepts. If you don’t know what an MD5 sum is, this article won’t enlighten you one bit—but if all you need to know is how to use openssl to generate a...

0 0
13

Windows Temporary Folder

In a recent article I outlined how to discover and change the location of Windows temporary files.

Chances are if you go look at the contents of that folder, you'll see lots of random stuff including oddly named files and sub folders empty files and more. In fact if you've never cleared out your temporary files it's quite possible that there's a lot of stuff there, taking up lots of room.

And most of it doesn't need to be there. Much of the contents of your temporary folder is not only temporary, but stale. Unfortunately many programs fail to clean up properly when they shut down, and any program that crashed has no chance to clean up at all. The result is a temp folder full of "stuff".

"Stuff" you can get rid of.

You can easily use Windows Explorer to navigate to the TMP folder (see this article to determine the location of the TMP folder on your machine). Once there select all the files and then:

press delete to...

0 0
14
...
0 0
15

Following is a very brief introduction to some useful Unix commands, including examples of how to use each command. For more extensive information about any of these commands, use the man command as described below. Sources for more information appear at the end of this document.

cal

This command will print a calendar for a specified month and/or year.

To show this month's calendar, enter:

cal

To show a twelve-month calendar for 2008, enter:

cal 2008

To show a calendar for just the month of June 1970, enter:

cal 6 1970

cat

This command outputs the contents of a text file. You can use it to read brief files or to concatenate files together.

To append file1 onto the end of file2, enter:

cat file1 >> file2

To view the contents of a file named myfile, enter:

cat myfile

Because cat displays text without pausing, its output may quickly scroll off your screen. Use the less command (described below) or an editor...

0 0
16

If you are having problems on your PC, Laptop or Server getting to a website or another address then your support department may often ask if you have “flushed your DNS cache”. When you go to a website it has two addresses, its domain name i.e.. Test.com and its IP address i.e.. 192.168.1.1, these details are cached to save time looking up the location of the website next time you need to visit.

Occasionally websites and other resources on your network need to change their IP addresses, so when you go to them via the host name (test.com) you cannot get to them because your device has cached the details it needs to get to them. We can quickly resolve this problem by flushing the DNS cache. Obviously there are many different flavours of OS, below I go through the commands on a few of them.

Flush DNS Cache on Windows Server and OS

This is a simple command and is ran from command line.

ipconfig /flushdns

Flush DNS Cache OSX Mountain Lion and Lion

...
0 0
17

The ikee worm has spread to jailbroken iPhones in Australia running SSH with the default root password. Follow the steps below to remove all ikee code and prevent Rick Astley from reappearing on your lock screen:

For known variants A, B or C

1. Run the Terminal app.
2. Enter each of the following commands followed by "return" to remove these files.

rm /bin/poc-bbot
rm /bin/sshpass
rm /System/Library/LaunchDaemons/com.ikey.bbot.plist
rm /var/lock/bbot.lock
rm /var/log/youcanbeclosertogod.jpg
rm /var/mobile/LockBackground.jpg

3. Reboot your iPhone.
4. Reinstall the SSH package from Cydia.
5. Follow these instructions to change your default root password and prevent reinfection!

For known variant D

1. Run the Terminal app.
2. Enter each of the following commands followed by "return" to remove these files.

rm /System/Library/LaunchDaemons/com.saurik.Cydia.Startup.plist
rm...

0 0
18

Also, from what the Bible says and shows, a prophet from God is never wrong as they receive the word directly from God. If you believe that, then why has the Watchtower prophets been wrong so many times. The Watchtower prophets have wrong prophecies about the start of the tribulation on multiple occasions. Here are a few examples with reference material for you to look at:
•1897 "Our Lord, the appointed King, is now present, since October 1874," (Studies in the Scriptures, vol. 4, p. 621).
•1899 "...the 'battle of the great day of God Almighty' (Revelation 16:14), which will end in A.D. 1914 with the complete overthrow of earth's present rulership, is already commenced," (The Time Is at Hand, 1908 edition, p. 101).
•1916 "The Bible chronology herein presented shows that the six great 1000 year days beginning with Adam are ended, and that the great 7th Day, the 1000 years of Christ's Reign, began in 1873," (The Time Is at Hand, forward, p. ii).
•1918 "Therefore...

0 0