Access project file (.adp)
.adp file signature | application/octet-stream
Magic Bytes
Offset: 0
CF FA ED FE
Access project file
Sources: Gary Kessler
All Known Signatures
2 signature variants are documented for .adp files across multiple sources.
| Hex Signature | Offset | Sources |
|---|---|---|
| CF FA ED FE | 0 | Gary Kessler |
| D0 CF 11 E0 A1 B1 1A E1 | 0 | Gary Kessler |
Validation Code
How to validate .adp files in Python
def is_adp(file_path: str) -> bool:
"""Check if file is a valid ADP by magic bytes."""
signature = bytes([0xCF, 0xFA, 0xED, 0xFE])
with open(file_path, "rb") as f:
return f.read(4) == signature
How to validate .adp files in Node.js
function isADP(buffer: Buffer): boolean {
const signature = Buffer.from([0xCF, 0xFA, 0xED, 0xFE]);
return buffer.subarray(0, 4).equals(signature);
}
How to validate .adp files in Go
func IsADP(data []byte) bool {
signature := []byte{0xCF, 0xFA, 0xED, 0xFE}
if len(data) < 4 {
return false
}
return bytes.Equal(data[:4], signature)
}
API Endpoint
/api/v1/adp
curl https://filesignature.org/api/v1/adp
See the full API documentation for all endpoints and parameters.
Frequently Asked Questions
What is a .adp file?
A .adp file is a Access project file file. Access project file
What are the magic bytes for .adp files?
The magic bytes for Access project file files are CF FA ED FE at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.
How do I validate a .adp file?
To validate a .adp file, read the first bytes of the file and compare them against the known magic bytes (CF FA ED FE) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.
What is the MIME type for .adp files?
There is no officially registered MIME type for .adp files. Systems typically use application/octet-stream as a generic fallback when handling this format.
Is it safe to open .adp files?
Access project file (.adp) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.