GNU Emacs Manual

Total Page:16

File Type:pdf, Size:1020Kb

GNU Emacs Manual GNU Emacs Manual GNU Emacs Manual Sixteenth Edition, Updated for Emacs Version 22.1. Richard Stallman This is the Sixteenth edition of the GNU Emacs Manual, updated for Emacs version 22.1. Copyright c 1985, 1986, 1987, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with the Invariant Sections being \The GNU Manifesto," \Distribution" and \GNU GENERAL PUBLIC LICENSE," with the Front-Cover texts being \A GNU Manual," and with the Back-Cover Texts as in (a) below. A copy of the license is included in the section entitled \GNU Free Documentation License." (a) The FSF's Back-Cover Text is: \You have freedom to copy and modify this GNU Manual, like GNU software. Copies published by the Free Software Foundation raise funds for GNU development." Published by the Free Software Foundation 51 Franklin Street, Fifth Floor Boston, MA 02110-1301 USA ISBN 1-882114-86-8 Cover art by Etienne Suvasa. i Short Contents Preface ::::::::::::::::::::::::::::::::::::::::::::::::: 1 Distribution ::::::::::::::::::::::::::::::::::::::::::::: 2 Introduction ::::::::::::::::::::::::::::::::::::::::::::: 5 1 The Organization of the Screen :::::::::::::::::::::::::: 6 2 Characters, Keys and Commands ::::::::::::::::::::::: 11 3 Entering and Exiting Emacs ::::::::::::::::::::::::::: 15 4 Basic Editing Commands :::::::::::::::::::::::::::::: 18 5 The Minibuffer :::::::::::::::::::::::::::::::::::::: 28 6 Running Commands by Name :::::::::::::::::::::::::: 35 7 Help ::::::::::::::::::::::::::::::::::::::::::::::: 36 8 The Mark and the Region ::::::::::::::::::::::::::::: 45 9 Killing and Moving Text :::::::::::::::::::::::::::::: 51 10 Registers ::::::::::::::::::::::::::::::::::::::::::: 60 11 Controlling the Display ::::::::::::::::::::::::::::::: 64 12 Searching and Replacement :::::::::::::::::::::::::::: 80 13 Commands for Fixing Typos ::::::::::::::::::::::::::: 97 14 Keyboard Macros ::::::::::::::::::::::::::::::::::: 103 15 File Handling :::::::::::::::::::::::::::::::::::::: 111 16 Using Multiple Buffers ::::::::::::::::::::::::::::::: 145 17 Multiple Windows ::::::::::::::::::::::::::::::::::: 154 18 Frames and Graphical Displays :::::::::::::::::::::::: 159 19 International Character Set Support :::::::::::::::::::: 173 20 Major Modes ::::::::::::::::::::::::::::::::::::::: 192 21 Indentation :::::::::::::::::::::::::::::::::::::::: 195 22 Commands for Human Languages :::::::::::::::::::::: 198 23 Editing Programs ::::::::::::::::::::::::::::::::::: 233 24 Compiling and Testing Programs::::::::::::::::::::::: 254 25 Maintaining Large Programs :::::::::::::::::::::::::: 272 26 Abbrevs ::::::::::::::::::::::::::::::::::::::::::: 282 27 Sending Mail ::::::::::::::::::::::::::::::::::::::: 288 28 Reading Mail with Rmail ::::::::::::::::::::::::::::: 297 29 Dired, the Directory Editor ::::::::::::::::::::::::::: 315 30 The Calendar and the Diary :::::::::::::::::::::::::: 329 31 Miscellaneous Commands ::::::::::::::::::::::::::::: 349 32 Customization :::::::::::::::::::::::::::::::::::::: 377 ii 33 Dealing with Common Problems ::::::::::::::::::::::: 409 A GNU GENERAL PUBLIC LICENSE ::::::::::::::::::: 423 B GNU Free Documentation License :::::::::::::::::::::: 429 C Command Line Arguments for Emacs Invocation :::::::::: 436 D X Options and Resources ::::::::::::::::::::::::::::: 452 E Emacs 21 Antinews :::::::::::::::::::::::::::::::::: 458 F Emacs and Mac OS ::::::::::::::::::::::::::::::::: 462 G Emacs and Microsoft Windows/MS-DOS :::::::::::::::: 467 The GNU Manifesto ::::::::::::::::::::::::::::::::::::: 474 Glossary :::::::::::::::::::::::::::::::::::::::::::::: 482 Key (Character) Index ::::::::::::::::::::::::::::::::::: 504 Command and Function Index :::::::::::::::::::::::::::: 512 Variable Index ::::::::::::::::::::::::::::::::::::::::: 523 Concept Index ::::::::::::::::::::::::::::::::::::::::: 529 iii Table of Contents Preface :::::::::::::::::::::::::::::::::::::::::::::: 1 Distribution ::::::::::::::::::::::::::::::::::::::::: 2 Acknowledgments ::::::::::::::::::::::::::::::::::::::::::::::::::: 2 Introduction :::::::::::::::::::::::::::::::::::::::: 5 1 The Organization of the Screen ::::::::::::::: 6 1.1 Point :::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 6 1.2 The Echo Area ::::::::::::::::::::::::::::::::::::::::::::::::: 7 1.3 The Mode Line::::::::::::::::::::::::::::::::::::::::::::::::: 8 1.4 The Menu Bar :::::::::::::::::::::::::::::::::::::::::::::::: 10 2 Characters, Keys and Commands :::::::::::: 11 2.1 Kinds of User Input ::::::::::::::::::::::::::::::::::::::::::: 11 2.2 Keys :::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 12 2.3 Keys and Commands:::::::::::::::::::::::::::::::::::::::::: 13 2.4 Character Set for Text :::::::::::::::::::::::::::::::::::::::: 14 3 Entering and Exiting Emacs :::::::::::::::::: 15 3.1 Exiting Emacs :::::::::::::::::::::::::::::::::::::::::::::::: 15 4 Basic Editing Commands ::::::::::::::::::::: 18 4.1 Inserting Text::::::::::::::::::::::::::::::::::::::::::::::::: 18 4.2 Changing the Location of Point ::::::::::::::::::::::::::::::: 19 4.3 Erasing Text :::::::::::::::::::::::::::::::::::::::::::::::::: 21 4.4 Undoing Changes ::::::::::::::::::::::::::::::::::::::::::::: 21 4.5 Files :::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 22 4.6 Help :::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 22 4.7 Blank Lines ::::::::::::::::::::::::::::::::::::::::::::::::::: 22 4.8 Continuation Lines :::::::::::::::::::::::::::::::::::::::::::: 23 4.9 Cursor Position Information ::::::::::::::::::::::::::::::::::: 23 4.10 Numeric Arguments:::::::::::::::::::::::::::::::::::::::::: 25 4.11 Repeating a Command::::::::::::::::::::::::::::::::::::::: 26 iv 5 The Minibuffer :::::::::::::::::::::::::::::::: 28 5.1 Minibuffers for File Names :::::::::::::::::::::::::::::::::::: 28 5.2 Editing in the Minibuffer :::::::::::::::::::::::::::::::::::::: 29 5.3 Completion ::::::::::::::::::::::::::::::::::::::::::::::::::: 30 5.3.1 Completion Example ::::::::::::::::::::::::::::::::::::: 30 5.3.2 Completion Commands::::::::::::::::::::::::::::::::::: 30 5.3.3 Strict Completion :::::::::::::::::::::::::::::::::::::::: 31 5.3.4 Completion Options :::::::::::::::::::::::::::::::::::::: 32 5.4 Minibuffer History :::::::::::::::::::::::::::::::::::::::::::: 32 5.5 Repeating Minibuffer Commands :::::::::::::::::::::::::::::: 33 6 Running Commands by Name ::::::::::::::: 35 7 Help :::::::::::::::::::::::::::::::::::::::::::: 36 7.1 Documentation for a Key ::::::::::::::::::::::::::::::::::::: 38 7.2 Help by Command or Variable Name :::::::::::::::::::::::::: 38 7.3 Apropos :::::::::::::::::::::::::::::::::::::::::::::::::::::: 39 7.4 Help Mode Commands :::::::::::::::::::::::::::::::::::::::: 41 7.5 Keyword Search for Lisp Libraries ::::::::::::::::::::::::::::: 41 7.6 Help for International Language Support :::::::::::::::::::::: 42 7.7 Other Help Commands:::::::::::::::::::::::::::::::::::::::: 42 7.8 Help Files::::::::::::::::::::::::::::::::::::::::::::::::::::: 43 7.9 Help on Active Text and Tooltips ::::::::::::::::::::::::::::: 44 8 The Mark and the Region :::::::::::::::::::: 45 8.1 Setting the Mark:::::::::::::::::::::::::::::::::::::::::::::: 45 8.2 Transient Mark Mode ::::::::::::::::::::::::::::::::::::::::: 46 8.3 Using Transient Mark Mode Momentarily ::::::::::::::::::::: 48 8.4 Operating on the Region :::::::::::::::::::::::::::::::::::::: 48 8.5 Commands to Mark Textual Objects :::::::::::::::::::::::::: 48 8.6 The Mark Ring ::::::::::::::::::::::::::::::::::::::::::::::: 49 8.7 The Global Mark Ring :::::::::::::::::::::::::::::::::::::::: 50 9 Killing and Moving Text:::::::::::::::::::::: 51 9.1 Deletion and Killing::::::::::::::::::::::::::::::::::::::::::: 51 9.1.1 Deletion ::::::::::::::::::::::::::::::::::::::::::::::::: 51 9.1.2 Killing by Lines :::::::::::::::::::::::::::::::::::::::::: 52 9.1.3 Other Kill Commands :::::::::::::::::::::::::::::::::::: 53 9.2 Yanking :::::::::::::::::::::::::::::::::::::::::::::::::::::: 53 9.2.1 The Kill Ring :::::::::::::::::::::::::::::::::::::::::::: 54 9.2.2 Appending Kills:::::::::::::::::::::::::::::::::::::::::: 54 9.2.3 Yanking Earlier Kills ::::::::::::::::::::::::::::::::::::: 55 9.3 Accumulating Text:::::::::::::::::::::::::::::::::::::::::::: 56 9.4 Rectangles :::::::::::::::::::::::::::::::::::::::::::::::::::: 57 9.5 CUA Bindings :::::::::::::::::::::::::::::::::::::::::::::::: 58 v 10 Registers :::::::::::::::::::::::::::::::::::::: 60 10.1 Saving Positions in Registers ::::::::::::::::::::::::::::::::: 60 10.2 Saving Text in Registers ::::::::::::::::::::::::::::::::::::: 60 10.3 Saving Rectangles in Registers ::::::::::::::::::::::::::::::: 61 10.4 Saving Window Configurations in Registers::::::::::::::::::: 61 10.5 Keeping Numbers in Registers:::::::::::::::::::::::::::::::: 61 10.6 Keeping File Names in Registers ::::::::::::::::::::::::::::: 62 10.7 Bookmarks :::::::::::::::::::::::::::::::::::::::::::::::::: 62 11 Controlling the Display :::::::::::::::::::::: 64 11.1 Scrolling ::::::::::::::::::::::::::::::::::::::::::::::::::::: 64 11.2 Automatic Scrolling :::::::::::::::::::::::::::::::::::::::::: 65 11.3 Horizontal Scrolling :::::::::::::::::::::::::::::::::::::::::: 66 11.4 Follow Mode :::::::::::::::::::::::::::::::::::::::::::::::::
Recommended publications
  • Bringing GNU Emacs to Native Code
    Bringing GNU Emacs to Native Code Andrea Corallo Luca Nassi Nicola Manca [email protected] [email protected] [email protected] CNR-SPIN Genoa, Italy ABSTRACT such a long-standing project. Although this makes it didactic, some Emacs Lisp (Elisp) is the Lisp dialect used by the Emacs text editor limitations prevent the current implementation of Emacs Lisp to family. GNU Emacs can currently execute Elisp code either inter- be appealing for broader use. In this context, performance issues preted or byte-interpreted after it has been compiled to byte-code. represent the main bottleneck, which can be broken down in three In this work we discuss the implementation of an optimizing com- main sub-problems: piler approach for Elisp targeting native code. The native compiler • lack of true multi-threading support, employs the byte-compiler’s internal representation as input and • garbage collection speed, exploits libgccjit to achieve code generation using the GNU Com- • code execution speed. piler Collection (GCC) infrastructure. Generated executables are From now on we will focus on the last of these issues, which con- stored as binary files and can be loaded and unloaded dynamically. stitutes the topic of this work. Most of the functionality of the compiler is written in Elisp itself, The current implementation traditionally approaches the prob- including several optimization passes, paired with a C back-end lem of code execution speed in two ways: to interface with the GNU Emacs core and libgccjit. Though still a work in progress, our implementation is able to bootstrap a func- • Implementing a large number of performance-sensitive prim- tional Emacs and compile all lexically scoped Elisp files, including itive functions (also known as subr) in C.
    [Show full text]
  • QUALM; *Quoion Answeringsystems
    DOCUMENT RESUME'. ED 150 955 IR 005 492 AUTHOR Lehnert, Wendy TITLE The Process'of Question Answering. Research Report No. 88. ..t. SPONS AGENCY Advanced Research Projects Agency (DOD), Washington, D.C. _ PUB DATE May 77 CONTRACT ,N00014-75-C-1111 . ° NOTE, 293p.;- Ph.D. Dissertation, Yale University 'ERRS' PRICE NF -$0.83 1C- $15.39 Plus Post'age. DESCRIPTORS .*Computer Programs; Computers; *'conceptual Schemes; *Information Processing; *Language Classification; *Models; Prpgrai Descriptions IDENTIFIERS *QUALM; *QuOion AnsweringSystems . \ ABSTRACT / The cOmputationAl model of question answering proposed by a.lamputer program,,QUALM, is a theory of conceptual information processing based 'bon models of, human memory organization. It has been developed from the perspective of' natural language processing in conjunction with story understanding systems. The p,ocesses in QUALM are divided into four phases:(1) conceptual categorization; (2) inferential analysis;(3) content specification; and (4) 'retrieval heuristict. QUALM providea concrete criterion for judging the strengths and weaknesses'of store representations.As a theoretical model, QUALM is intended to describ general question answerinlg, where question antiering is viewed as aerbal communicb.tion. device betieen people.(Author/KP) A. 1 *********************************************************************** Reproductions supplied'by EDRS are the best that can be made' * from. the original document. ********f******************************************,******************* 1, This work-was
    [Show full text]
  • Easy Ballet Wrap Skirt Tutorial
    Easy Ballet Wrap Skirt Tutorial You will need • More or less 1 yard of 45-60 inches fabric depending on size and length • Matching thread • Chalk pencil or fabric marker • Measuring tape and a ruler • Optional: A curved ruler. If you don’t have any you can free hand the curve of use something curvy • Rotary cutter and mat (optional) • Basic sewing notion supplies Choose your fabric Choose an appropriate fabric for a ballet wrap skirt. For best result, you will want to use a drape-y, lightweight fabric. For this tutorial, I used a mesh type fabric from the lingerie section. It has only mechanical stretch and doesn’t fray but you could easily choose a stretchy drape-y fabric, as long as you use a stable fabric for the ties. You could also choose a fabric that fray but keep in mind that you will need to hem the skirt. I will let you know in the tutorial when it’s time to hem if you need to! Rayon and viscose poplin, voile, silk, or polyester chiffon, light weight tulle or even nylon chiffon are great choices too! How to measure Unlike most circle skirts where you measure the waist and use that measurement to calculate your circle radius, you will need to wrap the measuring tape around your model’s waist and measure a few inches past her waist circumference. For example, in the photo above, I measured 24 inches while my daughter’s waist measure 19.5”. The excess is the amount of overlap that you want on the skirt.
    [Show full text]
  • Analisi Del Progetto Mozilla
    Università degli studi di Padova Facoltà di Scienze Matematiche, Fisiche e Naturali Corso di Laurea in Informatica Relazione per il corso di Tecnologie Open Source Analisi del progetto Mozilla Autore: Marco Teoli A.A 2008/09 Consegnato: 30/06/2009 “ Open source does work, but it is most definitely not a panacea. If there's a cautionary tale here, it is that you can't take a dying project, sprinkle it with the magic pixie dust of "open source", and have everything magically work out. Software is hard. The issues aren't that simple. ” Jamie Zawinski Indice Introduzione................................................................................................................................3 Vision .........................................................................................................................................4 Mozilla Labs...........................................................................................................................5 Storia...........................................................................................................................................6 Mozilla Labs e i progetti di R&D...........................................................................................8 Mercato.......................................................................................................................................9 Tipologia di mercato e di utenti..............................................................................................9 Quote di mercato (Firefox).....................................................................................................9
    [Show full text]
  • Emacspeak User's Guide
    Emacspeak User's Guide Jennifer Jobst Revision History Revision 1.3 July 24,2002 Revised by: SDS Updated the maintainer of this document to Sharon Snider, corrected links, and converted to HTML Revision 1.2 December 3, 2001 Revised by: JEJ Changed license to GFDL Revision 1.1 November 12, 2001 Revised by: JEJ Revision 1.0 DRAFT October 19, 2001 Revised by: JEJ This document helps Emacspeak users become familiar with Emacs as an audio desktop and provides tutorials on many common tasks and the Emacs applications available to perform those tasks. Emacspeak User's Guide Table of Contents 1. Legal Notice.....................................................................................................................................................1 2. Introduction.....................................................................................................................................................2 2.1. What is Emacspeak?.........................................................................................................................2 2.2. About this tutorial.............................................................................................................................2 3. Before you begin..............................................................................................................................................3 3.1. Getting started with Emacs and Emacspeak.....................................................................................3 3.2. Emacs Command Conventions.........................................................................................................3
    [Show full text]
  • Downloads." the Open Information Security Foundation
    Performance Testing Suricata The Effect of Configuration Variables On Offline Suricata Performance A Project Completed for CS 6266 Under Jonathon T. Giffin, Assistant Professor, Georgia Institute of Technology by Winston H Messer Project Advisor: Matt Jonkman, President, Open Information Security Foundation December 2011 Messer ii Abstract The Suricata IDS/IPS engine, a viable alternative to Snort, has a multitude of potential configurations. A simplified automated testing system was devised for the purpose of performance testing Suricata in an offline environment. Of the available configuration variables, seventeen were analyzed independently by testing in fifty-six configurations. Of these, three variables were found to have a statistically significant effect on performance: Detect Engine Profile, Multi Pattern Algorithm, and CPU affinity. Acknowledgements In writing the final report on this endeavor, I would like to start by thanking four people who made this project possible: Matt Jonkman, President, Open Information Security Foundation: For allowing me the opportunity to carry out this project under his supervision. Victor Julien, Lead Programmer, Open Information Security Foundation and Anne-Fleur Koolstra, Documentation Specialist, Open Information Security Foundation: For their willingness to share their wisdom and experience of Suricata via email for the past four months. John M. Weathersby, Jr., Executive Director, Open Source Software Institute: For allowing me the use of Institute equipment for the creation of a suitable testing
    [Show full text]
  • Emacs Speaks Statistics (ESS): a Multi-Platform, Multi-Package Intelligent Environment for Statistical Analysis
    Emacs Speaks Statistics (ESS): A multi-platform, multi-package intelligent environment for statistical analysis A.J. Rossini Richard M. Heiberger Rodney A. Sparapani Martin Machler¨ Kurt Hornik ∗ Date: 2003/10/22 17:34:04 Revision: 1.255 Abstract Computer programming is an important component of statistics research and data analysis. This skill is necessary for using sophisticated statistical packages as well as for writing custom software for data analysis. Emacs Speaks Statistics (ESS) provides an intelligent and consistent interface between the user and software. ESS interfaces with SAS, S-PLUS, R, and other statistics packages under the Unix, Microsoft Windows, and Apple Mac operating systems. ESS extends the Emacs text editor and uses its many features to streamline the creation and use of statistical software. ESS understands the syntax for each data analysis language it works with and provides consistent display and editing features across packages. ESS assists in the interactive or batch execution by the statistics packages of statements written in their languages. Some statistics packages can be run as a subprocess of Emacs, allowing the user to work directly from the editor and thereby retain a consistent and constant look- and-feel. We discuss how ESS works and how it increases statistical programming efficiency. Keywords: Data Analysis, Programming, S, SAS, S-PLUS, R, XLISPSTAT,STATA, BUGS, Open Source Software, Cross-platform User Interface. ∗A.J. Rossini is Research Assistant Professor in the Department of Biostatistics, University of Washington and Joint Assis- tant Member at the Fred Hutchinson Cancer Research Center, Seattle, WA, USA mailto:[email protected]; Richard M.
    [Show full text]
  • Absolute BSD—The Ultimate Guide to Freebsd Table of Contents Absolute BSD—The Ultimate Guide to Freebsd
    Absolute BSD—The Ultimate Guide to FreeBSD Table of Contents Absolute BSD—The Ultimate Guide to FreeBSD............................................................................1 Dedication..........................................................................................................................................3 Foreword............................................................................................................................................4 Introduction........................................................................................................................................5 What Is FreeBSD?...................................................................................................................5 How Did FreeBSD Get Here?..................................................................................................5 The BSD License: BSD Goes Public.......................................................................................6 The Birth of Modern FreeBSD.................................................................................................6 FreeBSD Development............................................................................................................7 Committers.........................................................................................................................7 Contributors........................................................................................................................8 Users..................................................................................................................................8
    [Show full text]
  • 1 What Is Gimp? 3 2 Default Short Cuts and Dynamic Keybinding 9
    GUM The Gimp User Manual version 1.0.0 Karin Kylander & Olof S Kylander legalities Legalities The Gimp user manual may be reproduced and distributed, subject to the fol- lowing conditions: Copyright © 1997 1998 by Karin Kylander Copyright © 1998 by Olof S Kylander E-mail: [email protected] (summer 98 [email protected]) The Gimp User Manual is an open document; you may reproduce it under the terms of the Graphic Documentation Project Copying Licence (aka GDPL) as published by Frozenriver. This document is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANT- ABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Graphic Documentation Project Copying License for more details. GRAPHIC DOCUMENTATION PROJECT COPYING LICENSE The following copyright license applies to all works by the Graphic Docu- mentation Project. Please read the license carefully---it is similar to the GNU General Public License, but there are several conditions in it that differ from what you may be used to. The Graphic Documentation Project manuals may be reproduced and distrib- uted in whole, subject to the following conditions: The Gimp User Manual Page i Legalities All Graphic Documentation Project manuals are copyrighted by their respective authors. THEY ARE NOT IN THE PUBLIC DOMAIN. • The copyright notice above and this permission notice must be preserved complete. • All work done under the Graphic Documentation Project Copying License must be available in source code for anyone who wants to obtain it. The source code for a work means the preferred form of the work for making modifications to it.
    [Show full text]
  • Emacs Quick Reference
    EmacsQuickReference Page1of4 EmacsQuick Emacs-Ring-SiteNumber27 Reference [NextSite|SkipNextSite|PreviousSite|SkipPreviousSite|ListSites| Home] ByPaulSeamons Notation ItisimportanttounderstandthenotationcommonlyusedinEmacsdocumentation.MostofthecommandsusedinEmacsconsistofamodifierkey,in conjuctionwithoneormoreotherkeys.Thefollowingarethecommonmodifierkeys: CTRL -(C)- TheCONTROLkey. META -(M)- DependingupontheterminalthisistheALTkey.YoumayalsousetheESCkeytosendMETA. ESC -(ESC)- TheESCAPEkey. SHIFT -(S)- TheSHIFTkey. InEmacsdocumentationitiscommontouseanabbreviatedsyntaxwhendescribingkeysequences.Insteadoftyping CTRL-xCTRL-c Youwouldtype C-xC-c ThiswouldrepresentholdingdowntheCONTROLkeyandpressingtheletterx,andthenholdingdowntheCONTROLkeyandpressingtheletterc. (M-C-\wouldrepresentholdingdownthetheALTkeyandCONTROLkeyandpressingthe"\"key.YoucouldalsopressandreleasetheESCAPEkey holddowntheCONTROLkeyandtypethe"\"key.) Thefollowingisatableofnotationforotherkeyboardcharacters. BACKSPC TheBACKSPACEkey. SPC TheSPACEbar. ENTER TheEnterkey. RET TheEnterkey. TAB TheTABkey. InsertMode? ThisisalargeplacewhereEmacsdiffersfromtheVieditor.InViyouareeitherinInsertModeoryouarenot.Inordertoexecutecommandsotherthan keyinsertionyouneedtobeoutofInsertionMode.ByusingCTRLtoescapethekeysequences,Emacsallowsyoutousethecommandsatanypoint inyoursession.Forexample,ifyouareinViandareinsertingtextyouwouldhavetotypethefollowingkeysequencetosaveyourfileandreturnto InsertMode: ESC:wi InEmacs(whichisessentiallyalwaysin"InsertMode")youwouldtypethefollowing: C-xC-s Whenviewedfromtheinsertionmodeviewpoint,Vidoesn'treallysaveanykeystrokesoverEmacsasiscommonlyclaimedbyreligiousViadvocates.
    [Show full text]
  • Encouragez Les Framabooks !
    Encouragez les Framabooks ! You can use Unglue.it to help to thank the creators for making Histoires et cultures du Libre. Des logiciels partagés aux licences échangées free. The amount is up to you. Click here to thank the creators Sous la direction de : Camille Paloque-Berges, Christophe Masutti Histoires et cultures du Libre Des logiciels partagés aux licences échangées II Framasoft a été créé en novembre 2001 par Alexis Kauffmann. En janvier 2004 une asso- ciation éponyme a vu le jour pour soutenir le développement du réseau. Pour plus d’infor- mation sur Framasoft, consulter http://www.framasoft.org. Se démarquant de l’édition classique, les Framabooks sont dits « livres libres » parce qu’ils sont placés sous une licence qui permet au lecteur de disposer des mêmes libertés qu’un utilisateur de logiciels libres. Les Framabooks s’inscrivent dans cette culture des biens communs qui, à l’instar de Wikipédia, favorise la création, le partage, la diffusion et l’ap- propriation collective de la connaissance. Le projet Framabook est coordonné par Christophe Masutti. Pour plus d’information, consultez http://framabook.org. Copyright 2013 : Camille Paloque-Berges, Christophe Masutti, Framasoft (coll. Framabook) Histoires et cultures du Libre. Des logiciels partagés aux licences échangées est placé sous licence Creative Commons -By (3.0). Édité avec le concours de l’INRIA et Inno3. ISBN : 978-2-9539187-9-3 Prix : 25 euros Dépôt légal : mai 2013, Framasoft (impr. lulu.com, Raleigh, USA) Pingouins : LL de Mars, Licence Art Libre Couverture : création par Nadège Dauvergne, Licence CC-By Mise en page avec LATEX Cette œuvre est mise à disposition selon les termes de la Licence Creative Commons Attribution 2.0 France.
    [Show full text]
  • Evil Twin Attack Android Apk
    Evil twin attack android apk Continue Evil double attack on android (alk99) root requered @abderrahaman this attack is similar to the stream and linset, but in another plate form video tuto'gt; alk99 csploit iptables binary termux android webserver (php server ) open csploit garnt superuser to install the resolution of the core new and wait, until he has finished extracting the close application en termux and wait until he did the installation type on termux : pkg install tsu pkg install git exit open server for php (or any other android webserver support php) install the newest package to copy the default page (file index ...) or page you prefer from fake pages go to you interchannel storage www and go public past it here and go to the server for the start of the hotspot your mobile phone and on the server for php choose wlan0 192.168.43.1 click on the starter server go to your browser and bring now all working clone git clone CD clone-download-Alk-evil- twin tsu bash install.sh wait Until it finishes in the view now type: exit and open termux and type: (now the server has to be launched, and the client must be connected) tsu alk99 alk99-evil-twin-on-andoid-v1 Copyright (C) 2018 by abderra in this new wireless attack, I will walk you through the process of creating Hot Spot 2.0 Evil Twinman. This is potentially another vector attack that can be used with or without social engineering that a penetration tester or nefarious actor can use when performing a wireless pen test or trying to socially engineer the user.
    [Show full text]