fdupes - finds duplicate files in a given set of directories
fdupes [ options ] DIRECTORY ...
Searches the given path for duplicate files. Such files are found by comparing file sizes and MD5 signatures, followed by a byte-by-byte comparison.
-r --recurse for every directory given follow subdirectories encountered within -R --recurse: for each directory given after this option follow subdirectories encountered within (note the ':' at the end of option; see the Examples section below for further explanation) -s --symlinks follow symlinked directories -H --hardlinks normally, when two or more files point to the same disk area they are treated as non-duplicates; this option will change this behavior -n --noempty exclude zero-length files from consideration -f --omitfirst omit the first file in each set of matches -A --nohidden exclude hidden files from consideration -1 --sameline list each set of matches on a single line -S --size show size of duplicate files -m --summarize summarize duplicate files information -q --quiet hide progress indicator -d --delete prompt user for files to preserve, deleting all others (see CAVEATS below) -N --noprompt when used together with --delete, preserve the first file in each set of duplicates and delete the others without prompting the user -I --immediate delete duplicates as they are encountered, without grouping into sets; implies --noprompt -p --permissions don't consider files with different owner/group or permission bits as duplicates -o --order=WORD order files according to WORD: time - sort by mtime, name - sort by filename -i --reverse reverse order while sorting -v --version display fdupes version -h --help displays help
Unless -1 or --sameline is specified, duplicate files are listed together in groups, each file displayed on a separate line. The groups are then separated from each other by blank lines. When -1 or --sameline is specified, spaces and backslash characters (\) appearing in a filename are preceded by a backslash character.
fdupes a --recurse: b will follow subdirectories under b, but not those under a. fdupes a --recurse b will follow subdirectories under both a and b.
If fdupes returns with an error message such as fdupes: error invoking md5sum it means the program has been compiled to use an external program to calculate MD5 signatures (otherwise, fdupes uses internal routines for this purpose), and an error has occurred while attempting to execute it. If this is the case, the specified program should be properly installed prior to running fdupes. When using -d or --delete, care should be taken to insure against accidental data loss. When used together with options -s or --symlink, a user could accidentally preserve a symlink while deleting the file it points to. Furthermore, when specifying a particular directory more than once, all files within that directory will be listed as their own duplicates, leading to data loss should a user preserve a file without its "duplicate" (the file itself!).
Adrian Lopez <email@example.com> FDUPES(1)
More Linux Commands
unshar(1) - unpack a shar file (Commands - Linux man page)
Unshar scans mail messages looking for the start of a shell archive. It then passes the archive through a copy of the shell to unpack it. It will accept multipl
XDeviceBell(3) - ring a bell on a device supported through t
The XDeviceBell request causes the server to ring a bell on the specified feedback of the specified device, if possible. The specified volume is relative to the
iptables-apply(8) - a safer way to update iptables remotely
iptables-apply will try to apply a new ruleset (as output by iptables-save/read by iptables-restore) to iptables, then prompt the user whether the changes are o
gvgen(1) - generate graphs (Commands - Linux manual page)...
gvgen generates a variety of simple, regularly-structured abstract graphs. OPTIONS The following options are supported: -c n Generate a cycle with n vertices an
wscanw(3ncurses) - convert formatted input from a curses win
The scanw, wscanw and mvscanw routines are analogous to scanf [see scanf(3)]. The effect of these routines is as though wgetstr were called on the window, and t
fmin(3) - determine minimum of two floating-point numbers...
These functions return the lesser value of x and y. RETURN VALUE These functions return the minimum of x and y. If one argument is a NaN, the other argument is
Tk_CreateEventHandler(3) - associate procedure callback with
Tk_CreateEventHandler arranges for proc to be invoked in the future whenever one of the event types specified by mask occurs in the window specified by tkwin. T
SDL_JoystickUpdate(3) - Updates the state of all joysticks
Updates the state(position, buttons, etc.) of all open joysticks. If joystick events have been enabled with SDL_JoystickEventState then this is called automatic
glRotatef(3gl) - multiply the current matrix by a rotation m
glRotate produces a rotation of angle degrees around the vector $(x, y, z)$. The current matrix (see glMatrixMode) is multiplied by a rotation matrix with the p
mrtg-unix-guide(1) The MRTG 2.17.4 Linux Unix Installation G
MRTG comes to you in Source Code. This means that you have to compile parts of it before you can use it on a Unix machine. These instructions help you to do so.
config.sub(1) - validate and canonicalize a configuration tr
../build-aux/config.sub [OPTION] ALIAS Canonicalize a configuration name. Operation modes: -h, --help print this help, then exit -t, --time-stamp print date of
latin2(7) - ISO 8859-2 character set encoded in octal, decim
The ISO 8859 standard includes several 8-bit extensions to the ASCII character set (also known as ISO 646-IRV). ISO 8859-2, the Latin Alphabet No. 2 is used to