How to remove a large file, belonging to the AppStore

I found a 4.4 GB file on my MBP. It is located at /private/var/folders/dd/vwx7zz_d2m9g70cwxb_p5n9w0000gp/C/com.apple.appstore/497 799835/zyk4624423266348316897.pkg. How do I remove all?

This procedure will remove some cache files. The files are generated automatically and do not contain any of your data. Sometimes they can become corrupted and cause problems like yours.

Please, back up all data.

Triple-click anywhere in the line of text below on this page to select this option:

open $TMPDIR..

Copy the selected text in the Clipboard by pressing Control-C key combination.

Launch the Terminal application integrated in one of the following ways:

☞ Enter the first letters of his name in a Spotlight search. Select from the results (it should be at the top).

☞ In the Finder, select go utilities ▹ of menu bar or press the combination of keys shift-command-U. The application is in the folder that opens.

☞ Open LaunchPad and start typing the name.

Paste in the Terminal window by pressing command + V. Depending on the web browser you use, you may need to press the return key. A folder with a long, random name should open. Inside, there should be a subfolder named 'C '. Drag that to the trash.

Log off or restart the computer. Empty the trash. Test.

Tags: Mac OS & System Software

Similar Questions

  • How to copy a large file from "my documents" on a CD?

    How to copy a large file on a CD?

    Hi Richard Shield.

    Please see article with some information:

    http://support.Microsoft.com/kb/306524

    I hope this helps!

  • How can I copy large files (> 15 GB) on several CDs or DVDs using features in Windows 7?

    How can I copy large files (> 15 GB) on several CDs or DVDs using features in Windows 7?  I tried Media Player, but simply, he stops and tells me that the file I copy is great.  I am looking for a way that will tell me to enter another dissk and continue copying until the file has copied at the end.

    You need to split the file into segments that will be adapted on the disks you are using.

    Windows has no characteristic that will do this for you. You can get a BluRay drive and disc http://en.wikipedia.org/wiki/Blu-ray_Disc, when you should be able to fit on a single disk file.

  • How to remove a Trojan allowing horse to the my computer when I did a scan? It's URGENT

    How to remove a Trojan allowing horse to the my computer when I did a scan?  There were 2 Trojan horses that was the same things and 1 was deleted and the other was allowed.  How can I remove it?  They are as follows:

    Trojan horse: JS / Redirected.EV - severe.    One was at 10:07 - deleted; the other was at 10:05 - authorized.  This is urgent if this Trojan horse is in my computer.  No threat in future analyses.  This means - he went at 10:05 and was withdrawn at 10:07.  I do not know, so need help.  Thank you charge.

    Hello

    Preferable to analyze with other programs to ensure that everything has been detected and removed.

    If you need search malware here's my recommendations - they will allow you to
    scrutiny and the withdrawal without ending up with a load of spyware programs running
    resident who can cause as many questions as the malware and may be harder to detect as
    the cause.

    No one program cannot be used to detect and remove any malware. Added that often easy
    to detect malicious software often comes with a much harder to detect and remove the payload. Then
    its best to be thorough than paying the high price later now too. Check with them to one
    extreme overkill point and then run the cleaning only when you are sure that the system is clean.

    It can be made repeatedly in Mode safe - F8 tap that you start, however, you must also run
    the regular windows when you can.

    TDSSKiller.exe. - Download the desktop - so go ahead and right-click on it - RUN AS ADMIN
    It will display all the infections in the report after you run - if it will not run changed the name of
    TDSSKiller.exe to tdsskiller.com. If she finds something or not does not mean that you should not
    check with the other methods below.
    http://support.Kaspersky.com/viruses/solutions?QID=208280684

    Download malwarebytes and scan with it, run MRT and add Prevx to be sure that he is gone.
    (If Rootkits run UnHackMe)

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Malwarebytes - free
    http://www.Malwarebytes.org/products/malwarebytes_free

    SuperAntiSpyware Portable Scanner - free
    http://www.SUPERAntiSpyware.com/portablescanner.HTML?tag=SAS_HOMEPAGE

    Run the malware removal tool from Microsoft

    Start - type in the search box-> find MRT top - right on - click RUN AS ADMIN.

    You should get this tool and its updates via Windows updates - if necessary, you can
    Download it here.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
    (Then run MRT as shown above.)

    Microsoft Malicious - 32-bit removal tool
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

    Microsoft Malicious removal tool - 64 bit
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=585D2BDE-367F-495e-94E7-6349F4EFFC74&displaylang=en

    also install Prevx to be sure that it is all gone.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Prevx - Home - free - small, fast, exceptional CLOUD protection, working with others
    security programs. It is a single scanner, VERY EFFICIENT, if it finds something to come back
    here or use Google to see how to remove.
    http://www.prevx.com/   <-->
    http://info.prevx.com/downloadcsi.asp  <-->

    Choice of PCmag editor - Prevx-
    http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

    Try the demo version of Hitman Pro:

    Hitman Pro is a second scanner reviews, designed to save your computer from malicious software
    (viruses, Trojans, rootkits, etc.). who infected your computer despite safe
    what you have done (such as antivirus, firewall, etc.).
    http://www.SurfRight.nl/en/hitmanpro

    --------------------------------------------------------

    If necessary here are some free online scanners to help the

    http://www.eset.com/onlinescan/

    -----------------------------------

    Original version is now replaced by the Microsoft Safety Scanner
    http://OneCare.live.com/site/en-us/default.htm

    Microsoft safety scanner
    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    ----------------------------------

    http://www.Kaspersky.com/virusscanner

    Other tests free online
    http://www.Google.com/search?hl=en&source=HP&q=antivirus+free+online+scan&AQ=f&OQ=&AQI=G1

    --------------------------------------------------------

    After the removal of malicious programs:

    Also follow these steps for the General corruption of cleaning and repair/replace damaged/missing
    system files.

    Start - type this into the search-> find COMMAND to top box and RIGHT CLICK-
    RUN AS ADMIN

    Enter this at the command prompt - sfc/scannow

    How to analyze the log file entries that the Microsoft Windows Resource Checker
    (SFC.exe) program generates in Windows Vista cbs.log
    http://support.Microsoft.com/kb/928228

    Run checkdisk - schedule it to run at the next startup, then apply OK then restart your way.

    How to run the check disk at startup in Vista
    http://www.Vistax64.com/tutorials/67612-check-disk-Chkdsk.html

    -----------------------------------------------------------------------

    If we find Rootkits use this thread and other suggestions. (Run UnHackMe)

    http://social.answers.Microsoft.com/forums/en-us/InternetExplorer/thread/a8f665f0-C793-441A-a5b9-54b7e1e7a5a4/

    ======================================

    If necessary AFTER you are sure that the machine is clean of any malware. (DO NOT USE IF)
    MALWARE IS STILL PRESENT).

    You can try a repair install or an upgrade in Place.

    You can use another DVD that aren't copy protected but you you need to own
    Product key. It must be the same version 32 or 64 BIT Vista OEM. Also the system
    machine to usually sell the cheap disk since you already own Windows. Don't forget to make a
    good backup or 3 (security in redundancy).

    On-site upgrade
    http://vistasupport.MVPs.org/repair_a_vista_installation_using_the_upgrade_option_of_the_vista_dvd.htm

    This tells you how to access the System Recovery Options and/or a Vista DVD
    http://Windows.Microsoft.com/en-us/Windows-Vista/what-happened-to-the-recovery-console

    How to perform a repair for Vista Installation
    http://www.Vistax64.com/tutorials/88236-repair-install-Vista.html

    =======================================

    For extreme cases:

    Norton Power Eraser - eliminates deeply embedded and difficult to remove crimeware
    This traditional antivirus analysis does not always detect. Because the Norton Power Eraser
    uses aggressive methods to detect these threats, there is a risk that it can select some
    legitimate programs for removal. You should use this tool very carefully and only after
    you have exhausted other options.
    http://us.Norton.com/support/DIY/index.jsp

    ================================

    If you are in North America, you can call 866-727-2338 to get infections of virus and spyware. Seehttp://www.microsoft.com/protect/support/default.mspx for more details. For international information, check your subsidiary local Support site.

    I hope this helps.

    Rob Brown - Microsoft MVP<- profile="" -="" windows="" expert="" -="" consumer="" :="" bicycle="" -="" mark="" twain="" said="" it="">

  • How to remove a schema after having connected the expdp session

    Dear Experts,

    How to remove a schema after you connect the expdp session?

    I'm not able to reach a work

    
    [oracle@orcl28 ~]$ expdp system/****  attach=SYS_EXPORT_SCHEMA_01
    
    
    Export: Release 12.1.0.1.0 - Production on Mon Jan 18 02:23:26 2016
    
    
    Copyright (c) 1982, 2013, Oracle and/or its affiliates.  All rights reserved.
    
    
    Connected to: Oracle Database 12c Release 12.1.0.1.0 - 64bit Production
    ORA-39002: invalid operation
    ORA-39000: bad dump file specification
    ORA-31640: unable to open dump file "/home/oracle/datapump/UREPJ.dmp" for read
    ORA-27037: unable to obtain file status
    Linux-x86_64 Error: 2: No such file or directory
    Additional information: 3
    

    You have this table in the schema of SYSTEM-SYS_EXPORT_SCHEMA_01?

    Delete this table, and then try again.

    Aman...

  • How to remove Code condition on iwatch after the last update

    How to remove Code condition on iWatch after the last update?

    Hello

    On your iPhone, in the application of the watch, go to: My Watch (tab) > password - tap on disable password.

  • How to remove an e-mail account on the iphone?

    How to remove an e-mail account on the iphone?

    davidfromgambrills wrote:

    How to remove an e-mail account on the iphone?

    mail/contacts/calendar settings - E-mail account - select - scroll down to delete.

  • How can I save xml file n, run the xml file? Please help me

    How can I save xml file n, run the xml file? Please help me

    Hello

    The question you have posted will be well suited in the MSDN forum. Click on the link below.

    http://social.msdn.Microsoft.com/forums/en/categories/

    In the meantime, I suggest you to return the item mentioned below.

    How to use XML Notepad to create an XML document

    http://support.Microsoft.com/kb/296560

  • How to create a VPN file .pcf for the CISCO VPN CLIENT software profile

    Dear all

    How to create a VPN file .pcf for the CISCO VPN CLIENT software profile

    Concerning

    Hi Imran,

    Can't do much about that because it depends on what authenticate you the VPN server and how the settings. But let me introduce you to the memory layout. Once you install and open a VPN client. Press it again and it opens up a new page for the VPN config.

    Example of configuration as it is attached. But it differs depending on the configuration of your vpn server.

    Once you create and save this profile. Your FCP file is stored.

    Please assess whether the information provided is useful.

    By

    Knockaert

  • How to remove a specific email inbox with the client application code?

    Hello

    How to remove a specific email inbox with the client application code?  Please suggest useful links.

    Advanced thanks.

    Concerning

    Sunil.G

    Your question is a bit broad, so it is difficult to give you details.

    First of all, you must have the ID of the original message. Usually, you get either by hanging the message when he came into the Inbox (by implementing FolderListener), or by retrieving a list of mail of enamel "Store".

    Once you have this message ID, you call Folder.deleteMessage ().

    Here, there is a laboratory of Developer:

    http://NA.BlackBerry.com/eng/developers/resources/Labs/listeningforemail.jsp

    Moreover, classes to look in the API of reference:

    Store

    Folder

    FolderEvent

    FolderListener

    Session

    ServiceConfiguration

    Message (message RIM, not the J2ME)

  • -What person we don't know how to remove a brand tool? Especially the online tool.

    -What person we don't know how to remove a brand tool? Especially the online tool.

    Hi aprilpineapple,

    Please refer to this article:- https://helpx.adobe.com/acrobat/using/mark-text-edits.html#delete_text_markups

    Kind regards

    Christian

  • How to save a pdf file so that the tool pane is not displayed

    How to save a pdf file so that the tool pane does not appear when the file is opened?

    Ah!  Thank you.  You are a star.

  • find data files belong to the backup piece

    Hi all

    DB 10.2.03.0

    Y at - it notice, that we can use to find data files belong to the backup piece. We can query the handle in order to find the name of the element.

    Hare krishna

    Hi Amit,

    Y at - it notice, that we can use to find data files belong to the backup piece.

    In fact, you have to join the three points of view in a sql against the target:
    Select p.handle, d.name
    Of
    v$ element_sauvegarde p,.
    v$ backup_datafile bd.
    v$ datafile d
    where p.handle = "& manage.
    and bd.set_stamp = p.set_stamp
    and bd.set_count = p.set_count
    and bd.file # d.file = #.
    /
    Rgds,
    Tycho

  • How to convert a text file and give the table

    Hai

    How to convert a text file and give the data of the table

    ISN'T THERE!

    You must put this

    SET_BLOCK_PROPERTY ('TEST_MS', insert_allowed, property_false);
    SET_BLOCK_PROPERTY ('TEST_MS', update_allowed, property_false);

    just before the last exception...

    Published by: Dora on January 19, 2010 14:54

  • IX4 - 300 d / General SIN: How can I move large files between different folders?

    Hi @all.

    My new IX4 - 300 d arrived yesterday

    After doing his RAID-things all night, now I want to move my files from my old NAS to this one.

    I do this using Copy-supported by the ix4 - 300 d, which work fine.

    A big problem for me: I want to reorganize some large files / directories (> 200 GB), so I have to cut and paste the files from one folder to another (all on the ix4 - 300 d, but with different user groups).

    When I move files between subfolders in a folder of the sin, it works fast enough - I think here that the transfer will be treated directly by the nas server.

    When I do the same thing between subfolders in different folders (which appear as various network drives in windows Explorer), it seems that the transfer is managed by my pc or laptop - and it is very slow...

    I tried to move the files on my network environment (all folders are subfolders of a server: ix4 - 300 d) because I thought the problem was in my network mapping, but it does not work faster.

    How will I know my ix4 - 300 d to move the files directly (without the "help" from my pc)?

    Another idea for me was to do it via ftp, but my ix4 - 300 d only refused my connection (have to try a little more)

    Please help me

    I "solved" the problem by creating a copy of the temporary employment with the manual removal of duplicates once the task is completed. The copy job run all night.

    For future problems, I must think of an another "file management".

    Thanks for your response!

Maybe you are looking for

  • Screen broken/Applecare

    Hi, I dropped my iPhone 5 this morning, and the screen cracked quite strongly. My question is when I'm going to fix it, I have AppleCare for my Macbook, which transfers on my iPhone as well so that I'll pay only $50 for the repair, not the whole pric

  • Why Yahoo embedded videos work

    some youtube videos, hulu, netflix, work etc but not embedded yahoo ones. I have the latest version of firefox and adobe Flash Player on windows 7 64 bit. I tried firefox and install/uninstall flashplayer. I also tried to load in safe mode, but it do

  • Microsoft Security Essantials found TrojanDownloader:Win32 / Brandal.A serious how do I remove it?

    I noticed that Microsoft Security Essentials not updated as it should. I read that Brandal Trojan horse downloads and installs programs on your computer and I just got 8 updates of windows who want to download and security essentials has not updated

  • Re: US laptop UK powercord

    Someone can tell me if I bought a Toshiba laptop in the United States, so can I buy a power cord for the United Kingdom do not use a plug adapter?

  • Limitations of memory PNRF and LabVIEW

    I've written a VI that reads a data PNRF file (using the data of LabVIEW PNRF plugin) and takes the data from the channels, sampling rate and channel names.  However, I am limited to playback the files having no more than 8 channels, 2 370 000 readin