Looking for duplicate file finder solution

Posted on 2008-06-11
Medium Priority
Last Modified: 2008-06-22
I'm looking for a software that can find duplicate files of all types either locally or remotely (network share). The app should be able to find files not just by name but by "signature" (something like MD5 hash). It should be able to find duplicates even if the filenames do not match but contents are the same (that's where other, more "intelligent" comparison mechanisms come into play).

Please don't post top 5 google searches - I can use google myself quite nicely. This will need to run on XP/2K3, free solution would be ideal, any solution that is licensed should be reasonably priced and if it is commercial solution, it has to be by an established compan, not by fly-by-night company that won't be there tomorrow to support the product.

Thanks in advance!
Question by:CynepMeH
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2
LVL 26

Expert Comment

ID: 21765921
I use this freeware application and it does just about everything you want *including* search by signature using either SHA or MD5 hashing algorithms.

Duplicate Files Searcher is an application for searching and deleting duplicate files on your computer. It is a platform-independent application.


LVL 11

Author Comment

ID: 21770238
Thanks for the link. Looks like an interesting utility but it appears a bit sluggish, possibly due to it being java-dependent and since it requires java we may not be able to use it, as not every system has java installed. Let's see what else surfaces...
LVL 11

Author Comment

ID: 21771326
I just ran duplicatefilesearcher - ran for over an hour just trying to get a listing of folders on a 40GB volume. I'm afraid that won't work. So, I guess it's back to the drawing board with an added requirement:

The solution must be robust.
I'll close this request out and re-open it, as I think it landed in a wrong area. I also want more eyes to look at it. Thanks souseran, sorry it didn't work out.
WordPress Tutorial 3: Plugins, Themes, and Widgets

The three most common changes you will make to your website involve the look (themes), the functionality (plugins), and modular elements (widgets).

In this article we will briefly define each again, and give you directions on how to install them.

LVL 26

Expert Comment

ID: 21773441
Before you close it, try this one:

Easy Duplicate Finder


Faster than Duplicate Files Searcher. Not Java dependent, and does CRC32 Checksum +FileSize comparisons.

Oh, and it's freeware.
LVL 11

Author Comment

ID: 21774800
Thanks, looks promissing, I'll check it out tonight! Much obliged.
LVL 11

Accepted Solution

CynepMeH earned 0 total points
ID: 21787251
Thanks for your suggestion but it didn't work out - software crashed hard several times on different systems, esp. when it needs to enumerate large volumes. Can't use it. Thanks for your recommendation anyway.

Featured Post

Does Your Cloud Backup Use Blockchain Technology?

Blockchain technology has already revolutionized finance thanks to Bitcoin. Now it's disrupting other areas, including the realm of data protection. Learn how blockchain is now being used to authenticate backup files and keep them safe from hackers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Concerto Cloud Services, a provider of fully managed private, public and hybrid cloud solutions, announced today it was named to the 20 Coolest Cloud Infrastructure Vendors Of The 2017 Cloud  (http://www.concertocloud.com/about/in-the-news/2017/02/0…
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…
Suggested Courses

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question