Solved

Free Duplicate File Finder and Drive Cleanup

Posted on 2013-12-07
3
471 Views
Last Modified: 2013-12-14
Are there any good duplicate file finders or drive organizing tools out there that don't put trojens or spyware on my computer. I have MP3s, photos, videos, etc..

Are there any best practices so i don't remove files from software or audio courses that have a pdf workbook  or anything that might be grouped. I'm assuming I need to go through the drive and do a lot of separation myself and then let the software run on an isolated folder.
0
Comment
Question by:MEATBALLHERO
3 Comments
 
LVL 17

Assisted Solution

by:Kent Dyer
Kent Dyer earned 167 total points
ID: 39703813
You can usually do pretty well on this guy's website - http://www.techsupportalert.com/best-free-duplicate-file-detector.htm

Gina Tripani always does pretty well too - http://lifehacker.com/290825/find-and-remove-duplicate-files-with-doublekiller
0
 
LVL 70

Assisted Solution

by:Merete
Merete earned 166 total points
ID: 39703969
I use Easy Duplicate finder and it separates the duplicates so you can see what is what in separate panels.
It also features a lot more things
I posted some more screenshots here
http://www.experts-exchange.com/Software/Photos_Graphics/Images_and_Photos/Q_28042351.html
the main interface shows exactly what you can do
Easy Duplicate finder
http://www.easyduplicatefinder.com/screenshots.html
http://www.easyduplicatefinder.com/
0
 
LVL 23

Accepted Solution

by:
Eirman earned 167 total points
ID: 39705781
The absolute best program for weeding out duplicates photos is Dpeg from www.somewareonthe.net  Although it's designed primarily for finding duplicate images, it can be used with any type file in multiple locations.

The program was developed by just one guy and I'm as sure as anyone can be sure about anything, that it contains no spyware.

You can do all of what you need without purchasing/registering  The program will continue to work forever if you don't register it. Registering allows you save databases of pictures which is a feature that I rarely use anyway.

In it's first use I recommend using it in MD5 Hash mode (it's like CRC mode, but more precise). You can safely auto-delete in MD5 Hash mode.
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I use more than 1 computer in my office for various reasons. Multiple keyboards and mice take up more than just extra space, they make working a little more complicated. Using one mouse and keyboard for all of my computers makes life easier. This co…
All of the resources available today make learning a new digital media easier than ever-- if you know where to begin. This is a clear, simple guide to a few of the basic digital art mediums and how to begin learning them on your own.
The goal of the tutorial is to teach the user the full work flow of how to use flash media encoder to stream onto YouTube.
In this sixth video of the Xpdf series, we discuss and demonstrate the PDFtoPNG utility, which converts a multi-page PDF file to separate color, grayscale, or monochrome PNG files, creating one PNG file for each page in the PDF. It does this via a c…

792 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question