Professional Documents
Culture Documents
DupInOut Duplicate Finder 1.1.2.1 User Manual
DupInOut Duplicate Finder 1.1.2.1 User Manual
User Manual
Version 1.1.2.1
A hash is a fixed size string representing the original data in your files. If two or more files
match the same hash, they are considered to be duplicates. If the hash value differs for two
or more files, they are considered to be unique files with original content. The entire hash
value of a file will change even if a single character was removed, replaced or added.
A hash is non-reversible. This means that, you cannot get back the original data from a file’s
hash. Otherwise, people could store millions of alpha-numeric characters into a smaller file
of a few KBs. CRC-32, MD5, SHA-1 and SHA-256 are some of the examples of the file
hashing algorithms used across the world. By default, DupInOut Duplicate Finder scans your
files using the MD5 hash algorithm, however you can change the default file hash algorithm
from the Scan Engine tab in the program settings.
Use your best judgement and experience to decide which duplicate files to keep and which
ones to delete or fix. We provide you various custom marking, un-marking algorithms to
automate and simplify your tasks. For example, you can choose to automatically keep all
files from a specific directory (for example, the backup folder in the above example). We’ll
discuss other algorithms in the latter part of this documentation.
DupInOut Duplicate Finder also excludes known operating system and program files
directories from the duplicates search for the protection, security and integrity of your
operating system. A list of all these files and folders is given under the Data Protection
Mechanism section.
If you’re a new user, we recommend performing test scans on test data until you become
familiar with the application and all of its features. For example: You can create a “Test”
folder on your Desktop and copy some of your files to that folder. You can then use that
folder to perform test scans for duplicates and then play around with the application & it’s
features.
2. Use “Move to Folder” & “Rename Files” Options Instead of Deleting Duplicates
We care about your data which is why we don’t restrict you to only “Permanent Delete”
option. We don’t force you to only delete duplicates. You can safely move your duplicates to
another folder of your choice using the “Move to Folder” option, or rename the duplicate
files using the “Rename Files” option. In this way, you can retain your duplicate files and
also differentiate them from the originals.
If you’re hesitant to delete your duplicates, we don’t recommend selecting the “Replace with
Shortcut” and “Move to Recycle Bin” options. This is because the “Replace with Shortcut”
option overwrites a duplicate file with a .lnk Shortcut file to the original. Also, due to an
inherent limitation in Windows, “Move to Recycle Bin” feature may sometimes permanently
delete files that are too large in size or contain long file paths.
A Duplicates List may contain hundreds of thousands of files. If you believe you’ve scanned
a specific folder by mistake as it contains your important/ sensitive data, you can choose to
automatically exclude all files from that folder and move them to the Safe List.
Please note that the Safe List feature does not actually move your files from one folder to
another. It is a security measure that excludes your files from the Duplicates List and adds
them to another list. You can reverse your decision by moving items from the Safe List to
the Duplicates List, if needed.
To learn know more about the Safe List feature and how to move your files to/ from the
Safe List using various automated patterns, refer to the Safe List section.
Prerequisites:
Steps:
2. Click on the Activate link label on the upper right corner of your screen.
3. Enter the License Key you’ve received in your purchase order confirmation email.
Prerequisites:
• You will need your own personalized LICENSE.DAT file for offline activation. Please
email us at support@dupinout.com from the email account you used during your
purchase to obtain this file.
Steps:
5. Offline License Install Tool will now open. Click on the Browse.. button and locate your
LICENSE.DAT file and then click on Open.
8. To order to verify and activate your license, open DupInOut Duplicate Finder, and
then click on the About link label on the top right corner.
9. If the text on the upper right corner changes to This product is activated with your
License Key, your license is successfully activated. Please note that the change in the text
may take a moment.
To update your software, make sure that you’re connected to the Internet.
Click on the About link on the upper right corner of the screen and then click on Check for
Updates.
If no updates are available, the following message box will pop-up on your screen:
If a new update is available, you will be prompted to choose whether to download and
install the update or cancel.
Warning:
• The program will close itself during the update procedure. Your duplicate search
results may be lost.
• Administrative privileges are required to install the downloaded update. A User
Account Control (UAC) dialog will prompt you to confirm installing the downloaded
update.
• In the event your Antivirus software blocks the new update, you may be required to
temporarily disable your Antivirus software.
• Drag & Drop: Simply drag and drop folders and drives to the Search Folders List or
Ignore Folders List.
• Using the Add Button: Click the Add button underneath your list and select the
destination folder or drive you want to add to the list. You can select multiple folders
at once by holding the Shift key or Ctrl key while clicking file names.
Tip: If you want to free-up maximum storage, it’s a good idea to leave the File Size filter
settings unchanged.
Tip: If you want to free-up maximum storage, leave the Scan all file types option
selected.
Upon clicking the Let me choose… option, a new dialog appears with the list of file type
groups.
To ignore a specific file type group, select the Ignore option from the drop-down box.
Edit Filter
The best thing about DupInOut Duplicate Finder is that you’re not limited to a certain
predefined file type groups. You can edit the existing comma-separated extensions list,
remove a group or create your own file type group.
To modify the comma-separated extensions list or change the group name, just double-click
it and you’ll get the following dialog:
Remove Filter
Click on the Remove button to remove an existing filter. A confirmation prompt will appear.
Click on Yes.
Open Profile
Use this option to open an existing Search Profile file stored on your computer. The default
file location is C:\Users\User_Name\Documents.
Save Profile
Use this option to save your current Search Profile to a file and re-load it at a later point of
time.
Clear Profile
Use this option to reset your Search Profile to default. Loads the default Search Profile with
empty Search Folders List, empty Ignore Folders List, no File Size Filters set and the Scan all
file types option pre-checked.
After the duplicate files are scanned, no action will be taken. This is the default option.
Use this option to automatically save the duplicate files list, pie-chart and scan summary and
then turn off your computer after completion of the duplicate scan.
Important: Any unsaved work (for example, any unsaved Word Documents that may be
open) will be lost. Make sure to save any unsaved work and close third-party programs
before choosing this option.
Use this option to automatically save the duplicate files list, pie-chart and scan summary and
then put your computer into sleep mode after completion of the duplicate scan.
Sleep Mode is a power saving state that moves your open documents and programs to the
Random-Access Memory (RAM). Even though your computer is powered on, it is on a low-
power state and consumes little power than it normally does. This option is particularly
useful if you’re stepping away from your computer for a few minutes or hours.
Save session & sleep option may not work if your computer doesn’t support the Sleep Mode
feature. Please contact your computer manufacturer or try the following solutions:
Important: Take a backup of your important documents and data on an external hard disk
or Internet-based cloud storage platform.
Possible resolutions:
Mark Files
When you mark a file, you are telling the program that it is a duplicate copy of other files
and you want to delete it/ move to folder/ rename/ replace with shortcut. In the following
example, 1 – Copy(2).jpg, 1 – Copy(3).jpg, 1- Copy.jpg, 2 – Copy(2).jpg and other files with
green color checkmark are marked files.
Unmark Files
When you un-mark a file, you’re choosing to keep the file, unchanged. DupInOut Duplicate
Finder will not take any action on that file. You must keep at least one file unmarked in each
duplicate group. In the above example, 1.jpg, 2.jpg, 4.jpg are unmarked files.
Post-Scan Protection
Pre-Scan Protection
DupInOut Duplicate Finder automatically excludes known system files and folders from the
Duplicates Search for the protection, security and integrity of your operating system and
installed applications.
Please note that some of these files and folders may be hidden and may not visible in the
File Explorer, or some of these folders may not be available on your system depending on
the Windows version you use and your current system configurations.
The following folders and files are automatically excluded from the Duplicates Search:
System Folders:
• C:\$WINDOWS.~BT
• C:\$Windows.~WS
System Files:
• C:\bootmgr
• C:\bootmgr.sys
• C:\BOOTNXT
• C:\BOOTNXT.sys
• C:\DumpStack.log.tmp
• C:\hiberfil.sys
• C:\pagefile.sys
• C:\swapfile.sys
Unmark all
Invert marking
Reverses the status of your files. Changes marked files to unmarked state and unmarked
files to marked state.
Clear Highlights
Open with…
Launches the Open with… dialog in Windows to load the selected file in your desired
external application. Select a file in the Duplicates List and choose Open with… option
when no default program is associated with your file type, or an external program fails to
load your file correctly.
If you have inadvertently scanned any such folders and the containing files show up in the
Duplicates List, you don’t need to re-perform the duplicate scan again while excluding those
folders. DupInOut Duplicate Finder saves your time, efforts and protects your data from
human errors by allowing you to exclude such already scanned files. With automated file
marking/ un-marking patterns available, you can exclude important files from the Duplicates
List and move those items to a separate list called Safe List. Just like any un-marked file,
anything that you move to Safe List will be kept unchanged. No action will be taken against
these files. You can thus protect your crucial documents from being accidentally marked for
deletion.
If you change your mind, you can move excluded items from the Safe List to the Duplicates
List.
Note: When you move items to the Safe List, it does not actually move your files, it only
moves the items from one list to another.
Mark by Date
Use this option to mark or un-mark files by their creation or last modification date. You can
also move items to the Safe List based on their dates.
Mark by Hash
Use this option to mark or un-mark files by their hash. You can also move items to the Safe
List based on their hash value.
Mark by Size
Use this option to mark or un-mark files by their size. You can also move items to the Safe
List based on their size.
• 0 bytes: 0 bytes files are empty files with no data. Select this option to mark, un-
mark or move 0-byte files to the Safe List.
• Equals: Use this option to mark, un-mark or move to Safe List files that are of a
specific size. For example, 10 MB.
• Is smaller than: Use this option to mark, un-mark or move to Safe List files that
are below a specific size. For example, files below 100 MB in size.
• Is larger than: Use this option to mark, un-mark or move to Safe List files that are
above a specific size. For example, files above 1 GB in size.
• Is in between: Use this option to mark, un-mark or move to Safe List files that are
between a specific file size range. For example, files above 10 MB and below 50 MB
in size.
• Find all: Highlights all matching items throughout the Duplicates List.
• Find Next: Highlights one item at a time.
Note: Exporting information to a file may take some time depending on the number of
items in your Duplicates List.
Note: Your activity history may be lost after formatting and reinstalling your operating
system. DupInOut Duplicate Finder automatically deletes older activity history to free-up
your storage. You can change the pertaining settings from the Misc tab of the Settings
dialog.
Using the Save Session feature, you can safely exit the application and shut down your PC
without losing the currently gathered Duplicate Files List. As soon as you re-launch the
program, the same Duplicate Files List, Pie-Chart and Scan Summary will be loaded again
(typically within a few seconds to a few minutes, depending on the size of the list). This can
be a handy feature when you don’t have enough time to review the Duplicate Files List, and
wish to review the files at a later time.
To save your session, simply click on the Close button on the upper right corner of the
screen. In the Close confirmation dialog, check the box labelled Save session before
exiting and then click on Yes.
Important: When you re-load the application again, no files are verified or no file hashes
are calculated again. The program only compares the file sizes and last write date which are
not sufficient to establish integrity of a file. Your results may have become partially or
entirely obsolete if the user or third-party applications have modified the file contents. It is
highly recommended that you review the files from a previous session carefully to avoid
potential data loss.
Move to Folder
Use this option to move all the marked files to a folder of your choice. For example, move all
duplicate files to the External Hard Disk.
Rename Files
Use this option to rename all the marked files with a unique text. Use this option to
distinguish duplicate files from the originals by adding a keyword at the beginning or end of
the file name (before the extension).
Select the Prefix option to add a keyword at the beginning of the file name, or choose
Suffix option to add a keyword at the end of the file name (before the file extension).
Warning: Your marked files will be overwritten. This action is akin to deleting the file.
Important:
• Depending on the Windows version you use, large files that exceed a certain size
limit and files that have longer file paths, may be permanently deleted and not
moved to the Recycle Bin.
• If the system administrator has disabled the Recycle Bin functionality, your files will
be permanently lost.
In the confirmation dialog, you’ll find “Delete left-over empty folders” checkbox at the
bottom left. When checked, DupInOut Duplicate Finder will automatically delete any empty
folders left after moving or deleting the contained duplicate files.
Note: This option will not delete any other pre-existing empty folders.
• Add button: Click on the Add button, select a folder of your choice and click Select
Folder. To select multiple folders at once, hold the Shift or Ctrl key of your
keyboard while clicking each folder.
• Drag & Drop: You can also drag and drop your folders into the relevant list.
Folder Structure
In the drop-down boxes underneath the Destination folder, you’ll be asked to specify names
for each sub-folder. This is an important step to build your own folder structure.
When you click a drop-down box, you’ll see options like this:
• Year (Long): Creates a sub-folder containing the creation/ modification year of your
file in the long format. For example: 2021.
Organize Criteria
In the Organize files by drop-down box, specify whether to organize your files by their
creation date or modification date.
In the Select an action area, choose whether to copy or move the organized files to the
destination directory.
• Simply compare two folders to check whether they contain the same files
• After copying a large number of files, you may run the Folder Compare to determine
whether all the files have been successfully copied or not. If the contents of the
Source Folder and Target Folder match, your files have been successfully copied,
otherwise they are not.
• Determine whether your files have been successfully synced or not (possible only
when you’ve the file syncing client application installed from your respective cloud
service provider- for example- Google Backup & Sync & OneDrive)
• Compare the original data with backup copies to identify whether it has been
corrupted, changed or unauthorized modified
Duplicate Finder feature checks for identical files from any folder, regardless of the folder
name, folder path and actual file name. Folder Compare, on the contrary, checks for same
files in a strict hierarchical pattern on a folder-to-folder basis with the specified criteria.
Compare Methods
You may compare the contents of your folders by choosing one of the following comparison
criteria:
• File Name + Content (Highly Recommended): Your files are compared by their
names and the actual content (text). It uses the default file hashing algorithm
specified under the Scan Engine tab of the Settings dialog. As the files are compared
by their text in addition to file names, this is the safest compare method. We highly
recommend you to always select this compare method to avoid false positives and
potential data loss.
• File Name + Size + Modify Date: Your files are compared by their names, sizes
and modification dates. Since the file content (text) is not taken into consideration,
any files matching the above parameters will be classified as same files, regardless of
whether they actually contain the same text or not.
Include Sub-Folders
When selected, Folder Compare will analyze and compare the contents of sub-folders inside
the Source Folder and Target Folder.