Solved

Utility for identifying files that are different

Posted on 2016-07-26
5
78 Views
Last Modified: 2016-08-06
Hi All - I have a folder full of about 10000 files, with a couple of levels of sub-folders.
(If it matters, they happen to be a web folders, copy on my local hard drive of a MAC OS X, websites are live on a Linux/Apache server).

Someone made changes to some of those files, and now I have a copy of that folder with those changes (as well as a copy of the Original folder)

What is the easiest way to do a comparison to see what files have changed between the two folders? (Presumably based on File_Size and Last_Modified_Date)

Note that I do not care what the content of each file is. I just want to know which file(s) were modified.
0
Comment
Question by:bleggee
5 Comments
 
LVL 5

Assisted Solution

by:Eric C
Eric C earned 250 total points
ID: 41730135
Yes! There is a fantastic program called Beyond Compare.
http://www.scootersoftware.com/

I believe they offer a free demo.

Another popular one is called UltraCompare.
http://www.ultraedit.com/products/ultracompare.html
0
 
LVL 28

Expert Comment

by:serialband
ID: 41730231
You can also use the built in command line rsync, but run it as a dry run to do the compare.

rsync -avun
0
 
LVL 39

Accepted Solution

by:
Eoin OSullivan earned 250 total points
ID: 41730717
BeyondCompare is great, works on OSX and has a demo period where it is fully functional.
If you're going to use it regularly it might be worth buying it but its not cheap.

I'd also recommend Deltawalker as an alternative.  Both are excellent at folder/file structure comparisons.

serialband's recommendation is also an option although the output on rsync will be command line based and show you files that are different but not exactly what the difference is.

For thousands of files and the ability to see the differences and ignore filte types, whitespaces etc.  BeyondCompare or Deltawalker are your best options
0
 
LVL 1

Author Comment

by:bleggee
ID: 41739852
Thx. I tried all & settled on Beyond Compare
0
 
LVL 5

Expert Comment

by:Eric C
ID: 41739864
Bleggee,
Sounds good. Please award points and the question will be closed. Thank you.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In Solr 4.0 it is possible to atomically (or partially) update individual fields in a document. This article will show the operations possible for atomic updating as well as setting up your Solr instance to be able to perform the actions. One major …
I wrote an article (http://www.experts-exchange.com/articles/2245/Anti-rootkit-software.html) some time ago with a reference to nLite  (http://www.nliteos.com/)slipstreaming software.  I recently changed that link to point to NTLite (https://www.ntl…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

948 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now