Skip to content

SPSS output file (.spo)

.spo file signature | application/octet-stream

Safe

Magic Bytes

Offset: 0
CF FA ED FE

SPSS output file

Sources: Gary Kessler

All Known Signatures

2 signature variants are documented for .spo files across multiple sources.

Hex Signature Offset Sources
CF FA ED FE 0 Gary Kessler
D0 CF 11 E0 A1 B1 1A E1 0 Gary Kessler

Validation Code

How to validate .spo files in Python

Python
def is_spo(file_path: str) -> bool:
    """Check if file is a valid SPO by magic bytes."""
    signature = bytes([0xCF, 0xFA, 0xED, 0xFE])
    with open(file_path, "rb") as f:
        return f.read(4) == signature

How to validate .spo files in Node.js

Node.js
function isSPO(buffer: Buffer): boolean {
  const signature = Buffer.from([0xCF, 0xFA, 0xED, 0xFE]);
  return buffer.subarray(0, 4).equals(signature);
}

How to validate .spo files in Go

Go
func IsSPO(data []byte) bool {
    signature := []byte{0xCF, 0xFA, 0xED, 0xFE}
    if len(data) < 4 {
        return false
    }
    return bytes.Equal(data[:4], signature)
}

API Endpoint

GET /api/v1/spo
curl https://filesignature.org/api/v1/spo

See the full API documentation for all endpoints and parameters.

Frequently Asked Questions

What is a .spo file?

A .spo file is a SPSS output file file. SPSS output file

What are the magic bytes for .spo files?

The magic bytes for SPSS output file files are CF FA ED FE at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.

How do I validate a .spo file?

To validate a .spo file, read the first bytes of the file and compare them against the known magic bytes (CF FA ED FE) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.

What is the MIME type for .spo files?

There is no officially registered MIME type for .spo files. Systems typically use application/octet-stream as a generic fallback when handling this format.

Is it safe to open .spo files?

SPSS output file (.spo) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.