Skip to content

Palm Address Book Archive file (.aba)

.aba file signature | application/octet-stream

Palm Address Book Archive file

Safe

Magic Bytes

Offset 0
00 01 42 41

Sources: Gary Kessler

Extension

.aba

MIME Type

application/octet-stream

Byte Offset

0

Risk Level

Safe

Validation Code

How to validate .aba files in Python

Python
def is_aba(file_path: str) -> bool:
    """Check if file is a valid ABA by magic bytes."""
    signature = bytes([0x00, 0x01, 0x42, 0x41])
    with open(file_path, "rb") as f:
        return f.read(4) == signature

How to validate .aba files in Node.js

Node.js
function isABA(buffer: Buffer): boolean {
  const signature = Buffer.from([0x00, 0x01, 0x42, 0x41]);
  return buffer.subarray(0, 4).equals(signature);
}

How to validate .aba files in Go

Go
func IsABA(data []byte) bool {
    signature := []byte{0x00, 0x01, 0x42, 0x41}
    if len(data) < 4 {
        return false
    }
    return bytes.Equal(data[:4], signature)
}

API Endpoint

GET /api/v1/aba
curl https://filesignature.org/api/v1/aba

See the full API documentation for all endpoints and parameters.

Frequently Asked Questions

What is a .aba file?

A .aba file is a Palm Address Book Archive file file. Palm Address Book Archive file

What are the magic bytes for .aba files?

The magic bytes for Palm Address Book Archive file files are 00 01 42 41 at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.

How do I validate a .aba file?

To validate a .aba file, read the first bytes of the file and compare them against the known magic bytes (00 01 42 41) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.

What is the MIME type for .aba files?

There is no officially registered MIME type for .aba files. Systems typically use application/octet-stream as a generic fallback when handling this format.

Is it safe to open .aba files?

Palm Address Book Archive file (.aba) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.