Browse Definitions:
Definition

binary-safe function

A binary-safe function is a function or operation that can be performed on a binary file without modifying the contents of the file. This ensures that the file is not corrupted or mutilated by the function or operation.

Binary data is encoded as a string of ones and zeros (bits), but is not formatted in any particular way. The bits are simply there, and no meaning is attached to them. Most programs, in contrast, have formatting codes that assign certain meanings to specific strings of bits. When a program is used in an attempt to read a binary file, the file is interpreted according to the rules of that program. Unless the formatting codes of the reading program match the formatting codes of the program in which the file was written, the display makes no sense, or else contains a jumble of apparently meaningless symbols in addition to data that has been stripped of formatting codes.

An image such as a JPEG file can be opened in a word processor, but the image does not appear. Instead, garbage is displayed. Any attempt to edit and then save a JPEG file using a word processor will result in modification of the binary data, such that the result is no longer readable by the intended program. The file is, in effect, corrupted. The editing of a JPEG image file using a word processor is thus an example of a function that is not binary-safe.

Issues with binary safety are often encountered when binary files are transferred over the Internet. This is especially true for large files, which can cause overflow of the memory, buffer, or storage capacity in one or more servers. Sometimes, transferred files are subjected to functions that strip formatting codes, or that incorrectly interpret certain binary strings as formatting codes. For example, angle brackets can be falsely interpreted as markers for HTML tags, or desired tags may be lost in the transfer of an HTML file. Quotation marks in plain-text or ASCII format may not be read that way by a Web browser. An HTML editor will convert quotation marks (") into a string of characters to prevent this confusion. An extra space ( ) in a Web page appears as a string of characters when the HTML source code is viewed in a text editor such as Windows Notepad. Conversely, such character strings are interpreted by Web browsers as quotation marks and spaces, even if the author of the file did not intend for them to be interpreted that way.

Binary files can be protected from undesired modification by programs. In the worst-case scenario, such modification can result in permanent loss of data because of file corruption. Sensitive files should always be backed up on read-only media such as a recordable compact disc (CD-R), so the original data can be retrieved in case of unwanted modification by a function that is not binary-safe. When transferring binary files to a Web site using a File Transfer Protocol (FTP) program, the "binary" setting can be used to prevent unwanted modification of the file contents during the transfer process.

This was last updated in June 2010

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • Red Hat OpenStack Platform

    Red Hat OpenStack Platform is a commercially supported distribution of open source OpenStack software designed to build and ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close