Solved

Windows Temp files.

Posted on 2000-05-03
9
213 Views
Last Modified: 2013-12-28
What extension(s) do I need to add to:

echo | del c:\windows\temp\*.*

to delete  hidden files in the windows temp folder.  This is ran as a batch file and cleans out temp files when a users logs on.








0
Comment
Question by:pbut835581
9 Comments
 
LVL 3

Accepted Solution

by:
israely earned 100 total points
ID: 2774810
add this line before the line you have listed:

attrib c:\windows\temp\*.* -h

I have never seen hidden files in temp directory.
0
 
LVL 3

Expert Comment

by:israely
ID: 2774819
Type:

attrib /?

to see all the switches avaiable at the dos prompt.
0
 
LVL 1

Expert Comment

by:m_santo
ID: 2774829
The *.* will make it delete all files with all extensions in the folder, already.

It will not, however, delete any subfolders.
0
 
LVL 1

Expert Comment

by:m_santo
ID: 2774835
m_santo changed the proposed answer to a comment
0
Swamped with email signature updates?

Have you been given a load of changes to make to your users’ email signatures? Having to manually implement multiple signatures for every department? Let Exclaimer save you from being swamped with email signature updates!

 
LVL 1

Expert Comment

by:m_santo
ID: 2774849
Whoops, I misread the question.  Missed the part about hidden files.  Sorry.
0
 
LVL 1

Expert Comment

by:m_santo
ID: 2774888
Whoops, I misread the question.  Missed the part about hidden files.  Sorry.
0
 
LVL 1

Expert Comment

by:red117
ID: 2775166
Why dont you just try deltree c:\windows\temp and delete the whole temp directory, when it tries to write to it again it will remake the directory.
0
 
LVL 7

Expert Comment

by:Ajnin
ID: 2775214
red117 idea is good, but to make not prompt the user, try the following syntax:
echo. Y|deltree c:\windows\temp
0
 

Author Comment

by:pbut835581
ID: 2775300
Thank you very much.  
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Several part series to implement Internet Explorer 11 Enterprise Mode
Sometimes drives fill up and we don't know why.  If you don't understand the best way to use the tools available, you may end up being stumped as to why your drive says it's not full when you have no space left!  Here's how you can find out...
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now