fdupes - finds duplicate files in a given set of directories


   fdupes [ options ] DIRECTORY ...


   Searches  the  given  path for duplicate files. Such files are found by
   comparing file sizes and MD5 signatures,  followed  by  a  byte-by-byte


   -r --recurse
          for  every  directory  given  follow  subdirectories encountered

   -R --recurse:
          for each directory given after this option follow subdirectories
          encountered  within  (note the ':' at the end of option; see the
          Examples section below for further explanation)

   -s --symlinks
          follow symlinked directories

   -H --hardlinks
          normally, when two or more files point to  the  same  disk  area
          they are treated as non-duplicates; this option will change this

   -n --noempty
          exclude zero-length files from consideration

   -f --omitfirst
          omit the first file in each set of matches

   -A --nohidden
          exclude hidden files from consideration

   -1 --sameline
          list each set of matches on a single line

   -S --size
          show size of duplicate files

   -m --summarize
          summarize duplicate files information

   -q --quiet
          hide progress indicator

   -d --delete
          prompt user for files to  preserve,  deleting  all  others  (see
          CAVEATS below)

   -N --noprompt
          when  used  together  with  --delete, preserve the first file in
          each set of duplicates and delete the others  without  prompting
          the user

   -I --immediate
          delete duplicates as they are encountered, without grouping into
          sets; implies --noprompt

   -p --permissions
          don't consider files with different  owner/group  or  permission
          bits as duplicates

   -o --order=WORD
          order files according to WORD: time - sort by mtime, name - sort
          by filename

   -i --reverse
          reverse order while sorting

   -v --version
          display fdupes version

   -h --help
          displays help




   Unless -1 or  --sameline  is  specified,  duplicate  files  are  listed
   together  in groups, each file displayed on a separate line. The groups
   are then separated from each other by blank lines.

   When -1 or --sameline is specified,  spaces  and  backslash  characters
   (\) appearing in a filename are preceded by a backslash character.


   fdupes a --recurse: b
          will follow subdirectories under b, but not those under a.

   fdupes a --recurse b
          will follow subdirectories under both a and b.


   If  fdupes returns with an error message such as fdupes: error invoking
   md5sum it means the program  has  been  compiled  to  use  an  external
   program  to  calculate  MD5 signatures (otherwise, fdupes uses internal
   routines for this purpose), and an error has occurred while  attempting
   to  execute  it.  If  this is the case, the specified program should be
   properly installed prior to running fdupes.

   When using -d or --delete, care  should  be  taken  to  insure  against
   accidental data loss.

   When  used  together  with  options  -s  or  --symlink,  a  user  could
   accidentally preserve a symlink while deleting the file it points to.

   Furthermore, when specifying a particular directory more than once, all
   files  within  that  directory  will be listed as their own duplicates,
   leading to data  loss  should  a  user  preserve  a  file  without  its
   "duplicate" (the file itself!).


   Adrian Lopez <adrian2@caribe.net>


More Linux Commands

unshar(1) - unpack a shar file (Commands - Linux man page)
Unshar scans mail messages looking for the start of a shell archive. It then passes the archive through a copy of the shell to unpack it. It will accept multipl

XDeviceBell(3) - ring a bell on a device supported through t
The XDeviceBell request causes the server to ring a bell on the specified feedback of the specified device, if possible. The specified volume is relative to the

iptables-apply(8) - a safer way to update iptables remotely
iptables-apply will try to apply a new ruleset (as output by iptables-save/read by iptables-restore) to iptables, then prompt the user whether the changes are o

gvgen(1) - generate graphs (Commands - Linux manual page)...
gvgen generates a variety of simple, regularly-structured abstract graphs. OPTIONS The following options are supported: -c n Generate a cycle with n vertices an

wscanw(3ncurses) - convert formatted input from a curses win
The scanw, wscanw and mvscanw routines are analogous to scanf [see scanf(3)]. The effect of these routines is as though wgetstr were called on the window, and t

fmin(3) - determine minimum of two floating-point numbers...
These functions return the lesser value of x and y. RETURN VALUE These functions return the minimum of x and y. If one argument is a NaN, the other argument is

Tk_CreateEventHandler(3) - associate procedure callback with
Tk_CreateEventHandler arranges for proc to be invoked in the future whenever one of the event types specified by mask occurs in the window specified by tkwin. T

SDL_JoystickUpdate(3) - Updates the state of all joysticks
Updates the state(position, buttons, etc.) of all open joysticks. If joystick events have been enabled with SDL_JoystickEventState then this is called automatic

glRotatef(3gl) - multiply the current matrix by a rotation m
glRotate produces a rotation of angle degrees around the vector $(x, y, z)$. The current matrix (see glMatrixMode) is multiplied by a rotation matrix with the p

mrtg-unix-guide(1) The MRTG 2.17.4 Linux Unix Installation G
MRTG comes to you in Source Code. This means that you have to compile parts of it before you can use it on a Unix machine. These instructions help you to do so.

config.sub(1) - validate and canonicalize a configuration tr
../build-aux/config.sub [OPTION] ALIAS Canonicalize a configuration name. Operation modes: -h, --help print this help, then exit -t, --time-stamp print date of

latin2(7) - ISO 8859-2 character set encoded in octal, decim
The ISO 8859 standard includes several 8-bit extensions to the ASCII character set (also known as ISO 646-IRV). ISO 8859-2, the Latin Alphabet No. 2 is used to

We can't live, work or learn in freedom unless the software we use is free.