Skip to content

OTHER (.other)

.other file signature | application/octet-stream

eXtensible Markup Language[29][66]

Safe

Magic Bytes

Offset 0
3C 3F 78 6D 6C 20

Sources: Wikipedia

Extension

.other

MIME Type

application/octet-stream

Byte Offset

0

Risk Level

Safe

Validation Code

How to validate .other files in Python

Python
def is_other(file_path: str) -> bool:
    """Check if file is a valid OTHER by magic bytes."""
    signature = bytes([0x3C, 0x3F, 0x78, 0x6D, 0x6C, 0x20])
    with open(file_path, "rb") as f:
        return f.read(6) == signature

How to validate .other files in Node.js

Node.js
function isOTHER(buffer: Buffer): boolean {
  const signature = Buffer.from([0x3C, 0x3F, 0x78, 0x6D, 0x6C, 0x20]);
  return buffer.subarray(0, 6).equals(signature);
}

How to validate .other files in Go

Go
func IsOTHER(data []byte) bool {
    signature := []byte{0x3C, 0x3F, 0x78, 0x6D, 0x6C, 0x20}
    if len(data) < 6 {
        return false
    }
    return bytes.Equal(data[:6], signature)
}

API Endpoint

GET /api/v1/other
curl https://filesignature.org/api/v1/other

See the full API documentation for all endpoints and parameters.

Frequently Asked Questions

What is a .other file?

A .other file is a OTHER file. eXtensible Markup Language[29][66]

What are the magic bytes for .other files?

The magic bytes for OTHER files are 3C 3F 78 6D 6C 20 at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.

How do I validate a .other file?

To validate a .other file, read the first bytes of the file and compare them against the known magic bytes (3C 3F 78 6D 6C 20) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.

What is the MIME type for .other files?

There is no officially registered MIME type for .other files. Systems typically use application/octet-stream as a generic fallback when handling this format.

Is it safe to open .other files?

OTHER (.other) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.