Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
CloneSpy V3.41 Released
#1
http://www.clonespy.com/?History        History
Version 3.41  (26.05.2018)

Added: Files and folders that are ignored during scanning can now be logged (see Logging page of the Options window).
Added: A new option remembers size and position of the Add folder window (see Priority page of the Options window).
Added: The new command line option -s allows for silent scans (see the help file for details).
Added: A message box now explains the Delete all (!) option on the Time + Size page of the Options window when that option is selected.
Modified: Removed the entry Programme from the default folder ignore list (see Folders page of the Options window).
Fixed: Hitting the space bar while a scan is ongoing no longer closes the scan progress window.
Fixed: The context help now works for the edit box in the Insert mask window.
Fixed: Corrected typo (spacing) in the Mode drop-down box of the Main window.    :   http://www.clonespy.com/?Download        Download
CloneSpy V3.41
Download  EXE-file, size 4622 KB  :  http://www.clonespy.com/?Features         Features
Why was CloneSpy written?
Do you often download files from the Internet? Is your hard drive crowded with these files? Have you ever asked yourself which files you have downloaded more than once? Perhaps you have burned files to a DVD and retrieved them again? Do you want to find these files and eliminate the duplicates? Maybe you want to find duplicate files without checking your entire collection of backup DVDs every time? Then CloneSpy is the right tool for you!

What can CloneSpy do?
CloneSpy can help you free up hard drive space by detecting and removing duplicate files. Duplicate files have exactly the same contents regardless of their name, date, time and location. Also, CloneSpy is able to find files that are not exactly identical, but have the same file name. Perhaps you have different versions of a file and you want to find all of them and remove the older versions. CloneSpy can also find zero length files. These are files that have no content.

With CloneSpy you can process files which

are duplicates
are duplicates having the same file name, title, or extension
have the same file name or title
have the same file name or title, and similar size
are zero bytes long
CloneSpy offers you a complete mechanism for determining which files should be
removed. It is also possible to leave this decision up to the individual user.

CloneSpy can handle equal files by

deleting redundant files
moving redundant files to a specific folder
exporting a list of all equal files without removing any files
deferring file operations on redundant files to a batch file where you can apply arbitrary file operations
replacing redundant files with shortcuts or hard links (NTFS) to retained files
With CloneSpy you can build checksum files from files on DVDs (or even on hard drives, etc.) and use them to check whether these files already exist on your system. The checksum files will prevent you from having to play DJ every time you search for duplicates!
BitDefender Log File 
Product : Bitdefender Total Security
Scanning task : Contextual Scan
Log date : Saturday, May 26, 2018 9:10:58 PM
Scan Paths: 
Path : C:\Users\mrtro\Desktop\cspy341.exe
 
[-]Detailed Scan Summary 

[-]Basic 
Scanned items : 182
Infected items : 0 (no infected items have been detected)
Suspicious items : 0 (no suspected items have been detected)
Resolved items : 0 (no threats have been detected during this scan)
Unresolved items : 0 (no issues remained unresolved)
 
[+]Advanced 

[-]Scan Options 

[-]Target Threat Types: 
Scan for viruses : Yes
Scan for adware : Yes
Scan for spyware : Yes
Scan for applications : Yes
Scan for dialers : Yes
Scan for rootkits : No
Scan for keyloggers : Yes
 
[-]Target Selection Options: 
Scan registry keys : No
Scan cookies : No
Scan boot sectors : No
Scan memory processes : No
Scan archives : Yes
Scan runtime packers : Yes
Scan emails : Yes
Scan all files : Yes
Heuristic Scan : Yes
Scanned extensions : none configured
Excluded extensions : none configured
 
[-]Target Processing: 
Default primary action for infected objects : None
Default secondary action for infected objects : None
Default primary action for suspicious objects : None
Default secondary action for suspicious objects : None
Default action for hidden objects : None
Default action for password-protected objects : Prompt for password 
(Not Digitally Signed Software)
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)