UTF-8 and UTF-16 and ASCAII

Posted on 2011-10-30
Last Modified: 2012-05-12

can any one explain how i can distinguish between different encoding characters when i make hexadecimal dump for file.

0000000: 5b44 6573 6b74 6f70 2045 6e74 7279 5d0a  [Desktop Entry].
0000010: 5665 7273 696f 6e3d 312e 300a 5479 7065  Version=1.0.Type
0000020: 3d4c 696e 6b0a 4e61 6d65 3d45 7861 6d70  =Link.Name=Examp

what is mean by endianness how is related to characters encoding?

Question by:ang3lus
    LVL 9

    Accepted Solution

    UTF-8 is backward compatible with ASCII, therefore it is not distinguishable between ASCII code and it's UTF-8 single byte counter part. Such as the data showed above, both encoding systems resulted the same codes.
    UTF-16 uses 16 or 32 bits to encode a character. The hex dump above is certainly not UTF-16.
    LVL 9

    Assisted Solution

    About the second question:
    In computer term, Endianness is the order of storing data for multi-byte words, where a big-endian machine stores most significant byte first, little-endian machine stores least significant byte first. Therefore the same UTF-16 word in different computer will store differently.
    More detail explanation can be found here

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    How your wiki can always stay up-to-date

    Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
    - Increase transparency
    - Onboard new hires faster
    - Access from mobile/offline

    The foremost challenge encountered by an investigator at the very beginning of a forensics investigation is, accessing a file/data to read/view its contents. Owing to the fact, a platform is necessary for both; opening as well as examining any file.…
    In this era, as you know, cybercrime and other sorts of frauds using the internet has increased day by day. We should protect our information assets and confidential information from getting exploiting by the attacker or intruders. Most of the fraud…
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
    In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    8 Experts available now in Live!

    Get 1:1 Help Now