CD Image Format Specifications or Source Code

Posted on 2003-12-09
Last Modified: 2008-02-01
I need links to sources for either specifications and/or source code to decode any or all of the following Cd image formats.

Alcohol 120%        .mds
BlindWrite             .bwi/.bwt
CDSpace              .lcd
CDRWin                .bin/.cue
CloneCD               .img/.ccd
DiscJuggler           .cdi
Duplicator             .tao/.dao
EasyCD Creator     .cif
Fantom CD           .mdf/.mds
Farstone              .vcd
Gear                     .p01/.md1/.xa
ISO                      .iso
Nero                    .nrg
Noum Vapor          .vaporcd
NTI CD Maker        .ncd
Prassi                   .gcd/.gi
WinOnCD              .c2d
VCDrom Extension .fcd
Virtual CD            .vc4/.000
Virtuo                  .vdi
Question by:katoa
  • 2
  • 2

Expert Comment

ID: 9907265
Aren't some of those formats propietary ???

Author Comment

ID: 9907410
I'm sure they are.  Yet quite a few applications seem to support reading, extracting, mounting, burning and/or converting them.   For example, UltraISO, WinISO, MagicISO, Daemon-Tools, Alcohol 120%, Fantom CD, etc.  The source or specs must be available somewhere?!

Accepted Solution

vowca earned 500 total points
ID: 9910440
Try to ask their makers.
But for exampel even Daemont cannot read NRG withouth Nero pre-installed. So NRG and NRA formats are not published.

ISO/Bin/CUE/SUB i think is the simpleist case - take "mkisofs" tool und read its sources

Author Comment

ID: 9913079
Great vowca.  mkisofs is a good lead for those simple formats.    I have tried to contact some of the format authoring companies, but they just respond that they are propietary.  I'm sure that everyone is using reverse-engineered code by some very skilled programmers.   Sure wish cdmage sources were available (freeware, but no source).  

Anyone else know of similar open source tools or locations for specifications for any other formats?

Expert Comment

ID: 10009335

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

RIA (Rich Internet Application) tools are interactive internet applications which have many of the characteristics of desktop applications. The RIA tools typically deliver output either by the way of a site-specific browser or via browser plug-in. T…
A short article about problems I had with the new location API and permissions in Marshmallow
An introduction to basic programming syntax in Java by creating a simple program. Viewers can follow the tutorial as they create their first class in Java. Definitions and explanations about each element are given to help prepare viewers for future …
In this fifth video of the Xpdf series, we discuss and demonstrate the PDFdetach utility, which is able to list and, more importantly, extract attachments that are embedded in PDF files. It does this via a command line interface, making it suitable …

930 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now