Solved

Looking for duplicate file finder solution

Posted on 2008-06-11
6
666 Views
Last Modified: 2008-06-22
I'm looking for a software that can find duplicate files of all types either locally or remotely (network share). The app should be able to find files not just by name but by "signature" (something like MD5 hash). It should be able to find duplicates even if the filenames do not match but contents are the same (that's where other, more "intelligent" comparison mechanisms come into play).

Please don't post top 5 google searches - I can use google myself quite nicely. This will need to run on XP/2K3, free solution would be ideal, any solution that is licensed should be reasonably priced and if it is commercial solution, it has to be by an established compan, not by fly-by-night company that won't be there tomorrow to support the product.

Thanks in advance!
0
Comment
Question by:CynepMeH
  • 4
  • 2
6 Comments
 
LVL 26

Expert Comment

by:souseran
ID: 21765921
I use this freeware application and it does just about everything you want *including* search by signature using either SHA or MD5 hashing algorithms.

Duplicate Files Searcher is an application for searching and deleting duplicate files on your computer. It is a platform-independent application.

http://duplicatefilessearcher.net/

0
 
LVL 11

Author Comment

by:CynepMeH
ID: 21770238
Thanks for the link. Looks like an interesting utility but it appears a bit sluggish, possibly due to it being java-dependent and since it requires java we may not be able to use it, as not every system has java installed. Let's see what else surfaces...
0
 
LVL 11

Author Comment

by:CynepMeH
ID: 21771326
I just ran duplicatefilesearcher - ran for over an hour just trying to get a listing of folders on a 40GB volume. I'm afraid that won't work. So, I guess it's back to the drawing board with an added requirement:

The solution must be robust.
I'll close this request out and re-open it, as I think it landed in a wrong area. I also want more eyes to look at it. Thanks souseran, sorry it didn't work out.
0
6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

 
LVL 26

Expert Comment

by:souseran
ID: 21773441
Before you close it, try this one:

Easy Duplicate Finder

http://www.easyduplicatefinder.com/

Faster than Duplicate Files Searcher. Not Java dependent, and does CRC32 Checksum +FileSize comparisons.

Oh, and it's freeware.
0
 
LVL 11

Author Comment

by:CynepMeH
ID: 21774800
Thanks, looks promissing, I'll check it out tonight! Much obliged.
0
 
LVL 11

Accepted Solution

by:
CynepMeH earned 0 total points
ID: 21787251
Thanks for your suggestion but it didn't work out - software crashed hard several times on different systems, esp. when it needs to enumerate large volumes. Can't use it. Thanks for your recommendation anyway.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension (http://www.experts-exchange.com/discussions/210281/Attachments-with-no-extension.html). This reminded me of questions tha…
Storage devices are generally used to save the data or sometime transfer the data from one computer system to another system. However, sometimes user accidentally erased their important data from the Storage devices. Users have to know how data reco…
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now