Solved

How to determint whether two DCOM files (DLL files) are the same or not?

Posted on 2009-03-31
2
539 Views
Last Modified: 2013-11-25
Hi Experts:

    I have a VB6 project producing a DLL file. I did the following experiment:
1. I open the VB6 project and compile it, then rename the resulted DLL file to Lib.DLL_1
2. compile again and rename the resulted DLL file to Lib.DLL_2
3. compare the files Lib.DLL_1 and Lib.DLL_2 with HEXCMP software(from http://www.grigsoft.com/hexcmp.htm)
4. I tried to compare these two files with MD5.exe, and the MD5 codes are different.

    Then the software show me that these two DLL files are different, while I expect them to be the same. Please help me at the following concerns:
1. Why would I get this result? Is it because of the time stamp of the files? or something else?
2. Can you suggest me a good way to compare the DCOM files?

More related information that I have: I have two files A and B with different names, and shown identical by HEXCMP and MD5.exe, so the file name should not matter. File B is obtained by moving A to a Visual Source Safe repository, and then retrive a copy from the repository. Then A and B are both renamed.

Thank you!
0
Comment
Question by:huangs3
2 Comments
 
LVL 22

Accepted Solution

by:
cj_1969 earned 500 total points
ID: 24039953
I'm no expert but reading this might help explain it ... http://en.wikipedia.org/wiki/MD5

Given that the hash is comprised of padded code, based on 128 bit segments then any optimization within the compile process that might change the order that the code is created and written out in not aonly CAN but WILL affect the hash code that is generated by the resultant file.

That said ... I don't know what is actually going on when you compile your code so this is purely hypothetical and just one idea/reason it would be producing different values.
0
 

Author Closing Comment

by:huangs3
ID: 31565146
You point out a part that nobody except Microsoft programmer may know, and we cannot not tell anything without that
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

In this article you will learn how to create a free basic website on Bitbucket, a git service provider. Polymer creates dynamic HTML components, which allow more flexibility than static HTML. This tutorial uses Ubuntu Linux but can also be done on W…
Skype is a P2P (Peer to Peer) instant messaging and VOIP (Voice over IP) service – as well as a whole lot more.
The viewer will learn additional member functions of the vector class. Specifically, the capacity and swap member functions will be introduced.
The viewer will learn how to successfully create a multiboot device using the SARDU utility on Windows 7. Start the SARDU utility: Change the image directory to wherever you store your ISOs, this will prevent you from having 2 copies of an ISO wit…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now