RagTime document file (.rtd)
.rtd file signature | application/octet-stream
RagTime document file
Magic Bytes
Offset 0
43 23 2B 44 A4 43 4D A5 48 64 72
Sources: Gary Kessler
Extension
.rtd
MIME Type
application/octet-stream
Byte Offset
0
Risk Level
Safe
Validation Code
How to validate .rtd files in Python
def is_rtd(file_path: str) -> bool:
"""Check if file is a valid RTD by magic bytes."""
signature = bytes([0x43, 0x23, 0x2B, 0x44, 0xA4, 0x43, 0x4D, 0xA5, 0x48, 0x64, 0x72])
with open(file_path, "rb") as f:
return f.read(11) == signature
How to validate .rtd files in Node.js
function isRTD(buffer: Buffer): boolean {
const signature = Buffer.from([0x43, 0x23, 0x2B, 0x44, 0xA4, 0x43, 0x4D, 0xA5, 0x48, 0x64, 0x72]);
return buffer.subarray(0, 11).equals(signature);
}
How to validate .rtd files in Go
func IsRTD(data []byte) bool {
signature := []byte{0x43, 0x23, 0x2B, 0x44, 0xA4, 0x43, 0x4D, 0xA5, 0x48, 0x64, 0x72}
if len(data) < 11 {
return false
}
return bytes.Equal(data[:11], signature)
}
API Endpoint
/api/v1/rtd
curl https://filesignature.org/api/v1/rtd
See the full API documentation for all endpoints and parameters.
Frequently Asked Questions
What is a .rtd file?
A .rtd file is a RagTime document file file. RagTime document file
What are the magic bytes for .rtd files?
The magic bytes for RagTime document file files are 43 23 2B 44 A4 43 4D A5 48 64 72 at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.
How do I validate a .rtd file?
To validate a .rtd file, read the first bytes of the file and compare them against the known magic bytes (43 23 2B 44 A4 43 4D A5 48 64 72) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.
What is the MIME type for .rtd files?
There is no officially registered MIME type for .rtd files. Systems typically use application/octet-stream as a generic fallback when handling this format.
Is it safe to open .rtd files?
RagTime document file (.rtd) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.