Solved

Free Duplicate File Finder and Drive Cleanup

Posted on 2013-12-07
3
466 Views
Last Modified: 2013-12-14
Are there any good duplicate file finders or drive organizing tools out there that don't put trojens or spyware on my computer. I have MP3s, photos, videos, etc..

Are there any best practices so i don't remove files from software or audio courses that have a pdf workbook  or anything that might be grouped. I'm assuming I need to go through the drive and do a lot of separation myself and then let the software run on an isolated folder.
0
Comment
Question by:MEATBALLHERO
3 Comments
 
LVL 17

Assisted Solution

by:Kent Dyer
Kent Dyer earned 167 total points
ID: 39703813
You can usually do pretty well on this guy's website - http://www.techsupportalert.com/best-free-duplicate-file-detector.htm

Gina Tripani always does pretty well too - http://lifehacker.com/290825/find-and-remove-duplicate-files-with-doublekiller
0
 
LVL 70

Assisted Solution

by:Merete
Merete earned 166 total points
ID: 39703969
I use Easy Duplicate finder and it separates the duplicates so you can see what is what in separate panels.
It also features a lot more things
I posted some more screenshots here
http://www.experts-exchange.com/Software/Photos_Graphics/Images_and_Photos/Q_28042351.html
the main interface shows exactly what you can do
Easy Duplicate finder
http://www.easyduplicatefinder.com/screenshots.html
http://www.easyduplicatefinder.com/
0
 
LVL 23

Accepted Solution

by:
Eirman earned 167 total points
ID: 39705781
The absolute best program for weeding out duplicates photos is Dpeg from www.somewareonthe.net  Although it's designed primarily for finding duplicate images, it can be used with any type file in multiple locations.

The program was developed by just one guy and I'm as sure as anyone can be sure about anything, that it contains no spyware.

You can do all of what you need without purchasing/registering  The program will continue to work forever if you don't register it. Registering allows you save databases of pictures which is a feature that I rarely use anyway.

In it's first use I recommend using it in MD5 Hash mode (it's like CRC mode, but more precise). You can safely auto-delete in MD5 Hash mode.
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you s…
In this article, you will read about the trends across the human resources departments for the upcoming year. Some of them include improving employee experience, adopting new technologies, using HR software to its full extent, and integrating artifi…
Viewers will learn how to use LFOs to modulate the sound of their Sampler instruments. Click the Modulation tab in Sampler: Choose one (or more) of the three available LFOs, and click the respective button to turn it on: Select a waveform, an LF…
An overview on how to enroll an hourly employee into the employee database and how to give them access into the clock in terminal.

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question