Dupehunter Professional provides users with a simple tool for finding and erasing bulky duplicate files. With a simple layout, users of all levels will clear up computer space/
We ignored the mostly uninformative Help file because the program's interface was strengthened by a five-part wizard that walked us through every step of the dupe-hunting process. With the wizard we were able to quickly select folders for scanning and algorithms to search by, though we used the default option because the custom algorithm options required a higher level of computer expertise. The program whipped through our files in a few seconds and listed all duplicate files with check boxes that allow items to be deleted or compressed. The program also provides a useful feature where users can recall specific folder searches, essentially cutting a few steps from the wizard. The program worked with incredible fluidity and speed, but we were disappointed that the duplicates list did not include thumbnails so we could know for sure what was being deleted. However, we were able to overlook this slight misstep because the program worked well and met all other expectations.
DupeHunter Professional comes with a 30-day trial. The program installs a desktop icon without asking permission and leaves folders behind after uninstall. We recommend this program thanks to its ease of use and fast results.
Dupehunter Professional is an innovative search program to identify duplicate files on personal computers or in a network. Dupehunter Professional has a well-considered basis and offers a high degree of flexibility. File types are unlimited, exact definition and search according to date and time, size, attributes and contents are included in this program, as in the choice of folders and directories or drives, system-wide or within whole networks. Any search you select can be stored as a "Job" and re-loaded at any time. Dupehunter use the algorithms CRC-32, MD5, SHA-1, and additional a true Byte-to-Byte comparison. You can delete files by using secure methods like overwriting with Random data, acc. to DoD 5220.22-M and Gutmann.