Drop any file to identify it
No upload. No signup. No sending your file halfway across the internet.
We tell you what it is, right here in your browser.
Drop it!
Let go to identify this file.
Couldn't identify this file
Need to convert it? fwip it →
Every folder you open in macOS Finder gets a `.DS_Store` (Desktop Services Store) file written into it — a small binary file that remembers icon positions, view modes (icon vs list vs column), background images, and other Finder-specific preferences for that folder. The file is invisible by default (leading dot plus macOS hiding rules), so most Mac users never notice it exists until it shows up somewhere unexpected.
The format is a proprietary binary structure derived from Apple's BUD1 schema (the magic bytes literally spell "Bud1" after a 4-byte length prefix). It's not officially documented, but third-party libraries can parse it — useful for forensics or for cleaning up after macOS users in shared environments. Tools like `dsstore` (Python library) and `dsstoreedit` decode the structure. The contents are often more revealing than they look: leaked .DS_Store files can disclose folder contents and naming patterns.
The chronic problem is that .DS_Store files leak into version control, ZIPs, and shared network folders. Every macOS user has at some point committed a .DS_Store accidentally. Standard fix: add `.DS_Store` to your global gitignore via `git config --global core.excludesfile ~/.gitignore_global` then add the pattern to that file. To remove already-committed ones: `find . -name .DS_Store -print -delete && git add -A && git commit -m "remove .DS_Store"`. To stop Finder writing .DS_Store to network shares: `defaults write com.apple.desktopservices DSDontWriteNetworkStores true`.
* Reads .DS_Store automatically (file is hidden by default) * Inspect / edit DS_Store contents