ERF 1C file. How to open file.erf? Chain of free blocks

- Extension (format) are symbols at the end of the file after the last point.
- The computer defines the file type according to the expansion.
- By default, Windows does not show file name extensions.
- The name of the file and expansion cannot be used some characters.
- Not all formats are related to the same program.
- The following are all programs with which you can open the ERF file.

XnView is a fairly powerful program that combines many features to work with images. It can be a simple view of files, and their conversion, and minor processing. It is a cross-platform, which allows it to use it almost in any system. The program is also unique in that it supports about 400 different image formats, among which are found both the most used and popular and non-standard formats. XnView can make a batch conversion of images. True, it is possible to convert them only in 50 formats, but among these 50 formats there are all popular expansion ...

Chasys Draw IES is a multifunctional editor, which includes a number of such utilities as a graphic editor, a utility for viewing images and a photo, a module for batch conversion graphics and a module for converting digital photos to the RAW format. In the main window of the application, you can personalize the work list by selecting the type of project you want to create. The application allows such complex manipulations with images as creating a print composition, animation for web resources, an image for a CD, DVD. The program allows you to scan the image in the presence of the desired equipment. In addition to such a set ...

XnConvert - Useful Utility for Conversion and primary processing Photos and images. Works with 400+ formats. Supports all popular graphic formats. Using simple XNConvert tools, you can adjust the brightness, gamut and contrast. The application you can change the size of photos, impose filters and a number of popular effects. The user can add watermarks and retouch. Using an application, you can delete meta data, crop files and rotate them. XnConvert supports a log in which the user will see all the detailed information about its recent manipulations with images.

HoneyView is a simple and beautiful program for watching photos. Supports all popular images and photographs and photographs, while those are "untreated". There is also a convenient interface where you can view a photo on the entire screen, or in parallel two photos, which is very convenient if you need to choose the best. You can immediately save your favorite photos to a separate folder. If in the photo present data on the location, then the program will open Google Maps, where it will be possible to see the place where the photo is taken. Using hot keys, the program will open in Windows Explorer, a photo that is open in ...

Wireshark - a program designed mainly for system administrators and serving network traffic analysis. There are situations where your network begins to malfunction and find the cause of these failures is often quite difficult. It may be a virus, and a spyware actions, or another reason. To find, and then eliminate the culprit, it will be necessary to test the entire incoming and outgoing traffic. For this, the Wireshark program needs. This application has a graphical interface and very popular around the world, because the information can be viewed not only in the code, but also with the help of a graphic ...

Imbatch allows you to quickly and easily edit any image. It is enough to open it or drag into the program window and you can start work. Allows you to enable preview from effects and changes and suitable for simple color change or for scaling, as well as for more professional work. The program is also good for the fact that it is light and does not load the processor when working, everything is very fast - the image has opened, put the effect, saved. It has a wide selection of tools and features, can impose effects, such as blur, color settings and many other. Imbatch supports many languages, including ...

WildBit Viewer is a program for viewing digital photos, characterized by the abundance of functions and capabilities. For example, the program has a standard effect editor, and it is also possible to use the finished image as a desktop background. In addition, you can view images in the slide show mode, which is convenient if you show your photos to someone and do not want to manually flip them. The program has more than 70 transition effects when showing a slide show. Another feature of the program is the display of all metadata, as well as renaming images. Supported and batching

Zoner Photo Studio is a very useful editor of various images. Allows you to copy photographs from any camera and immediately edit. It has a set of basic functions. Helps eliminate the "red-eye effect". Allows you to create bright panoramic views and colorful calendars. The program helps to create your own shots gallery. Carries out a quick search for the desired processed photo. Allows you to print snapshots, send to social networks, by email. It has four tabs that allow you to manage the program. Imports images, allows you to control the image archive on the computer.

Free Opener is a fairly functional viewer of the most popular files, including WinRar archives, Microsoft Office documents, PDF, PHOTOSHOP documents, torrent files, icons, web pages, text documents, audio and video files, graphic files including Flash and much more. The number of supported files exceeds seventy. The program does not have customization and options and options with the exception of the design change. It is also necessary to note that there is no Russian language, but considering simplicity, you should not underestimate the program. Free Opener is a universal and very convenient program for reading various types of files.

Samoa frequent cause Problems with the disclosure of the ERF file is simply the absence of appropriate applications installed on your computer. In this case, it is enough to find, download and install an application serving files in ERF format - such programs are available below.

Search system

Enter the file extension

Help

prompt

It is necessary to take into account that some encoded data from files that our computer does not read can sometimes be viewed in a notebook. In this way, we read text fragments or numbers - it is worth checking whether this method also acts in the case of ERF files.

What to do if the application from the list has already been installed?

Frequently installed application must automatically contact the ERF file. If this did not happen, the ERF file successfully can be associated manually with a newly installed application. Just right-click on the ERF file, and then among the options you can select the "Select the default program" option. Then you need to select the "View" option and find your favorites application. The changes entered must be approved using the OK option.

Programs that open the ERF file

Windows
Linux

Why can't I open the ERF file?

Problems with ERF files may also have other soil. Sometimes even establishing on a computer softwareserving ERF files will not solve the problem. The reason for the impossibility of opening, as well as working with the ERF file may also be:

Inappropriate ERF file connections in registry entries
- Damage to the ERF file that we open
- File infection ERF (viruses)
- too small computer resource
- irregular drivers
- Troubleshooting ERF extension from Windows System Registry
- unfinished installation of a program serving ERF extension

The elimination of these problems should lead to free opening and working with ERF files. In the event that the computer still has problems with files, you must use the help of an expert who will set the exact cause.

My computer does not show file extensions, what to do?

In standard installation systems, the computer does not see the ERF file extension. It can be successfully changed in the settings. Enough to enter the "Control Panel" and choose "View and Personalization". Then you need to enter the "folder options", and open the "View". In the "View" tab, the option "Street extensions of known file types" is optional - you must select this option and confirm the operation by pressing the "OK" button. At this point, the expansion of all files, including the ERF, the file name must appear.

* .cf. - The file contains only the configuration (code and structure) without user data. Created from the 1C 8.x configurator: "Configuration -\u003e Save the configuration to a file" or "Configuration -\u003e Configuration Supply -\u003e Create a Supply File and Configuration File -\u003e Sign" Create Delivery File "".

* .cfu. - The file contains only a configuration update. For example file1cv8.cfu. It is impossible to create a configuration from this file, as it contains only the differences of the new configuration from the previous one. Created from the 1C 8.x configurator: "Configuration -\u003e Configuration Supply -\u003e Create a delivery file and updating configuration -\u003e Sign" Create a configuration update file ".

* .dt. - The file contains a configuration along with a user database. This is a specialized format of the archive 1C 8. Created from the 1C 8.x configurator: "Administration -\u003e unload information base."

* .epf. (* .erf.) - External processing file (report). Any processing (report) from the configuration can be saved by external. Created from the 1C 8.x configurator: "Configuration -\u003e Open configuration -\u003e We become on the desired processing (report) -\u003e We allocate the right mouse button -\u003e Save as external processing, the report ...".

* .1cd. - File full-fledged database. Presentation of the default name: 1CV8.1CD. Includes configuration, database, user settings. Opens 1C 8.x platform. Created to develop a new configuration automatically by the "Add" button when choosing a "Creating a new information base".

* .log, * .lgf, * .lgp, * .elf- Log files that collect information (register data) in 1C 8.0 8.1, 8.2, 8.3.

* CDN -file with such an extension ( 1cv8.cdn) serves to manual or automatically blocking the 1C enterprise database The eighth version.

* .mxl. - Files of printed forms are used, including 1C. These are both printed forms of documents, reference books, reports, as well as various data storage devices for various classifiers. Opened via the configurator or in 1C mode: the company via "File -\u003e Open". It is created in the same way: in the configurator mode or in 1C: Enterprise through "File -\u003e New". Also, files with such extensions can serve as a transfer rules, for example, from 1C 7.7 to 8.2 (aCC77_82.xml and auxiliary processing EXP77_82.ERT) - they are usually in the ExtForms folder.

* .efd. - This is an archive file 1C, used to set the configuration. Contains or configuration 1C or update to it. It starts using the setup.exe auxiliary executing file (must be in one folder).

* .mft.- auxiliary file to create a configuration from the template. Contains configuration information, description, path, title. Used directly to the platform itself when creating an information base of 1C from the template.

* .grs. - Files of graphic circuits in 1C specialized format. Opened via the configurator or in 1C mode: the company via "File -\u003e Open". It is created in the same way: in the configurator mode or in 1C: Enterprise through "File -\u003e New".

* .geo.- Files of geographic schemes in 1C specialized format. Opened via the configurator or in 1C mode: the company via "File -\u003e Open". It is created in the same way: in the configurator mode or in 1C: Enterprise through "File -\u003e New".

* .st. - Text template files. Used mostly 1C developers.

* .pff - File with saved performance measurements. Used by system administrators and 1C specialists.

If you have on a computer installed antivirus program can scan all files on your computer, as well as each file separately. You can scan any file by right-clicking on the file and selecting the appropriate option to check the file for the presence of viruses.

For example, in this picture allocated file My-File.erfthen you need to right-click on this file, and select the option in the File menu "Scan with AVG". When this parameter is selected, AVG Antivirus will open, which will check this file for viruses.


Sometimes an error may occur as a result invalid software installationWhat can be related to the problem that occurred during the installation process. It may interfere with your operating system. tie your ERF file with proper application softwarehaving an impact on the so-called "Association of File Extensions".

Sometimes simple reinstalling Bioare Neverwinter Nights It can solve your problem correctly linking ERF with Bioare Neverwinter Nights. In other cases, problems with file associations may result from bad Software Programming Developer, and you may be required to contact the developer for more accommodation.


Tip: Try updating the Bioware Neverwinter Nights to the latest version to make sure that the latest fixes and updates are installed.


It may seem too obvious, but often directly the ERF file itself may cause the problem. If you received a file through an email attachment or downloaded it from a website, and the download process was interrupted (for example, a power outage or for another reason), the file may be damaged. If possible, try to get a new copy of the ERF file and try to open it again.


Caution: A damaged file may entail the occurrence of accompanying damage to the previous or already existing malware on your PC, so it is very important that the updated antivirus constantly worked on your computer.


If your ERF file associated with hardware on your computerTo open the file you may need update device driversassociated with this equipment.

This problem Usually related to the types of multimedia filesthat depend on the successful opening of hardware inside the computer, for example, sound card or video card. For example, if you are trying to open an audio file, but you can't open it, you may need update sound card drivers.


Tip: If you try to open the ERF file you get error message associated with S.Sys File, the problem is likely to be associated with damaged or outdated device driversthat need to be updated. This process can be facilitated by using software to update drivers, such as DriverDoc.


If the steps did not solve the problemand you still have problems opening ERF files, it may be related to lack of available system resources. For some versions of ERF files, considerable amount of resources may be required (for example, memory / RAM, computing power) for proper opening on your computer. Such a problem occurs quite often if you use enough old computer hardware and at the same time a much newer operating system.

This problem may occur when a computer is difficult to cope with the task, since the operating system (and other services operating in the background) can consume too much resources to open the ERF file.. Try to close all applications on your PC before opening the BioWare Entity Resource File. After freeing all the available resources on your computer, you will provide the best conditions for attempting to open the ERF file.


If you performed all the steps described above, and your ERF file still does not open, it may be necessary to perform equipment update. In most cases, even when using old versions of equipment, computing power can still be more than sufficient for most user applications (if you do not perform a lot of resource-intensive processor operation, such as 3D rendering, financial / scientific modeling or intensive multimedia work) . In this way, it is likely that your computer lacks the required amount of memory.(more often called "RAM", or RAM) to perform the task of opening a file.

The internal structure of the configuration file (* .cf) is not a secret. Good people have long disassembled him and created a lot of interesting utilities, allowing to work with this format. There will be a good tens (if not more than) interesting publications, somehow read the contents of * .cf files, so this theme is not new.

However, good, good-quality documentation for this format, unfortunately, quite a bit. For writing this article, I was supervised deeplywater, which in detail, in all details described the structure of the File IB 1C format: enterprises (* .1cd).

The article, as it seems to me, has become a catalyst for a variety of developments created by other authors. The openness and availability of information pushed the creative activity of the authors, and the community received a number of excellent tools for working with 1C file databases.

I think that detailed description CF format will also be able to interest many authors, and maybe we will get the opportunity to see a lot of new interesting developments on the subject of configuration files.

Prehistory.

As mentioned above, the structure of the format has long been known and the network has information on its structure (although, quite scanty). I need this information the development of a program, working on which, I relied on the following materials:

  • Author
  • http://www.richmedia.us/post/2011/01/18/cf-file-format-1c-8-compatible.aspx, if not mistaken, author -
  • Author

Terminology

We turn directly to the topic of our discussion.

In order to place points over I, let's decide on the name of the format itself.

First, in this format are not only configuration files, but also files of external reports and treatments. On the Internet, I got the name of the compound file. Perhaps it is established among old-timers 1C, but I don't really like it.

I propose within this article to call this format " container" If the respected audience tells in the comments correct name, I'll be very happy.

We look inside

Logical storage unit inside container is an document . The document is a meaningful complete set of data that you can read and somehow interpret. I specifically not use the term " file"Because, this is the name I will engineer for another entity, which is a little later.

So, in general terms, the CF file (EPF / ERF) is container in which stored documentation .

Each document inside the container can be divided into blocks . The minimum physical storage unit is blockbut the meaningful logical unit is document. In other words, documents inside the container may lie in the form of scattered pieces ( blocks) And in order to read the contents of the document, all of its pieces need to be collected and combined.

Container structure

The container includes the following parts (in order):

  1. Container header
    1. The address of the first empty unit in which you can add data
    2. Default block size
    3. Number of files in the container
  2. Container table contents document
  3. Actually, the data listed in the table of contents

In order to read the contents of the container, you need to read the document of the table of contents. However, since document comprises blocksBefore you need to learn how to collect a full document from these units.

Structure block

The block consists of a header and body. The title indicates the total size of the entire document, the size of the current block and the address (position in the file) of the next block. Immediately behind the heading is the body of the block - in fact, the data we need. The body of the block has exactly that length (in bytes), which is indicated in the title.

Inside the container here and there is a magical constant, denoting some "emptiness" - this is the number 0x7FFFFFFF.

When we collect the document from blocks, we look at the header to the address of the next block. If it is 0x7FFFFFFF, then there is no "next" block, this one is the last.

Constant 0x7FFFFFFF is an int_max value, i.e. The maximum value of a 4-byte integer with a sign.

Logical "Files"

I mentioned that the term " file"I will save up to better times. These times have come :)

The whole configuration is stored in a container in the form files. If we remember the school course of informatics, then remember that the "file", they talked to us - this is named document.

Filelocking from the "document" by the fact that he has a name, and this name can be applied to it. If we disassemble the contents of the configuration and build the metadata tree, we will find inside the files a lot of references to other files. The configuration read procedure operates with names files And refers to them by name.

If we take out the results, then we can say the following: there are different in the container documentationBut some of them have a name. Such documents are called " files"And they are not a service, but directly applied. Exactly files Store information about configuration metadata.

File components

Each file consists of two documents:

  1. Attributes document that contains file name and creation / change dates
  2. Content document that contains the actual file body

Now that all components are voiced, it remains to consider, perhaps the most important container document - a table of contents, which indicates the location of all container files. As mentioned above, the table of contents document is the very first container document and it goes immediately behind the container heading.

  1. Address (offset in file) Attribute document
  2. Address (offset in the file) of the content document
  3. The number 0x7FFFFFFF (record end marker).

I remind you that each document can be divided into blocks (fragmented). The algorithm for assembling a document from blocks will be discussed below.

The table of contents is 2 of meaningful numbers Int32. The first number is the address of the file attribute document. At this address we will start at the beginning of the 1st block of the attribute document. From the attribute document, we can find out the file name. The second number is the address of the content document document. At this address, we will start at the beginning of the 1st block of the content document, from which we will read the file data directly.

Features of data compression.

The container may contain a variety of files. As a rule, these are text files in the UTF-8 encoding. However, there may be other container files among the container files. The easiest way to carry out an analogy with the file system. The container is the directory, and the files inside the container is its contents. Directory may contain other directory.

The root directory of this "File System" is the * .cf file itself. There may be other container files inside it, in fact - nested directories that are read exactly by the same algorithm itself and have exactly the same structure.

Nevertheless, there is one feature of the root directory. Everything documents of content Files inside the root directory are compressed according to the Deflate algorithm. The contents of files within the nested directories are no longer compressed. Simply put, at the top level of the body-container file of all files are compressed, but if the file inside the container itself is a container, then the files will be recorded inside it in its pure form (without compression).

Chain of free blocks

As a result of deleting any data from the container, empty places may form. These free places are associated with a chain and form a certain "document" whose data is absent. In other words, free blocks are connected with each other by the same principle on which the blocks of documents are connected with each other. The address of the first free block is indicated at the very beginning of the container header. If the address of the free block is int_max, it means that in the middle of the container there are no free (empty) blocks.

A brief summary of the theoretical part

  1. The CF file (EPF / ERF) is recorded in the "Container" format
  2. The container begins with the title
  3. All contents of the container, with the exception of the title, recorded in the form of "documents"
  4. The document may be divided into blocks
  5. The document begins with the title of the block, according to which you can find out how to read the entire document entirely
  6. Immediately after the heading of the container is a document of the table of contents.
  7. Table of contents, this is a set of records that indicate " files"Inside the container
  8. Each file consists of two documents - the attribute document, where the name of this file and the content document is indicated, where, in fact, the file data is located.
  9. Each table of contents contains 2 addresses. The first is the address of the file attribute document, the second address of the content document.
  10. The container may contain attached containers (as it were, invested folders)
  11. Files inside the root container are compressed by the Deflate algorithm, files inside the nested containers are recorded without compression.

Let's already train bytes

So, it's time to consider how specifically all the entities mentioned above are arranged.

The main way to read the data from the container is to read the chain of blocks that make up certain documents. It seems that it will correctly begin with the principle of reading block documents.

Reading a document on blocks

Each document in the container necessarily begins with the block title. In this case, the document may be divided into several blocks. In order to read the document, it is necessary to "collect" it from blocks.

So, the block header is a string of 31 bytes. This line has the following form:

[Size of the entire document] [Space] [Size of the current block] [SPACE] [the address of the next block] [space], where:

  • CRLF - standard translation of the Windows string, a pair of symbols \\ r \\ n (0x0d, 0x0a)
  • The size of the entire document is the total length of the document in bytes. Required in the form of a string representation of the Hex number. Length - 8 bytes.
  • Space - space. Symbol 0x20.
  • The size of the current block is the length of the body block in bytes. Also recorded as a string representation of the INT32 number in Hex-format. If the document consists of a single block, then the size of the entire document is either less or coincided with the size of the current block (which is logical)
  • The address of the next block is the address to which the next block of the document is located. If the address of the next block is INT_MAX, then this means that there is no next block. The address of the next block is also recorded as a string representation of the number.

Immediately, the block heading is the body of the block, which has the length specified in the "Size of the current block" field.

Consider Figure: The length of the entire document is 0x54 bytes, the red frame is highlighted these 0x54 bytes. This is the document data. The block length is 0x200 bytes, i.e. More than the length of the document itself. For this reason, the remaining block data is "zeros" of unused space. The meaningful bytes are those that are marked with a red frame.

If the length of the document is larger than the block length, then you need to read the next block. If in the "Address Address Address" field, a value other than 0x7FFFFFFF is recorded, then you need to count the current block, then go through this address and count another block. If the address of the next block also be specified in this block, then you need to go there. Thus, the "chain" of the blocks, of which the document consists.

You must continue reading until 0x7FFFFFF value is met in the "Address Address Address" field or the amount of bytes specified in the "size of the entire document" field will not be read.

The "size of the entire document" field makes sense only for the first block. In all subsequent blocks of the document, it has a value of 0x00000000.

Container header format

The container header has a length of 16 bytes and consists of the following fields:

Field

Explanation

Address of the first free block

INT32 (4 bytes)

Displacement for which the chain of free blocks begins

Default block size

INT32 (4 bytes)

The block may have an arbitrary length, but the default value can be used to add new blocks, for example.

The field of unknown destination (see comments on the article) often coincides with the number of files in the container

INT32 (4 bytes)

A number reflecting a certain value is usually coinciding with the number of files in a container, however, colleagues in the comments believe that it is not quite so. On the container interpretation algorithm, this number does not affect it, it can be ignored.

Reserved field

INT32 (4 bytes)

Always equal to 0 (always?)

Format of the Document Recording Document

File attribute document format

The attribute document describes the name of the file and the date of its creation / change.

Field

Explanation

File creation time

Uint64 (8 bytes)

File creation time expressed in the number of 100 microsecond intervals since the beginning of our era (01.01.0001 00:00:00)

File change time

Uint64 (8 bytes)

Similarly

Reserved field

INT32 (4 bytes)

Always equal to 0. Perhaps these are flags of attributes, something like "read only", "hidden", etc. However, I have not met the files where this field would differ from zero.

File name

String in UTF-16 format

It takes the remaining body of the document (minus 2 dates and backup fields)

Container reading principle

  1. Collect the document of the table of contents and read it
  2. Bypass all entries in the document of the table of contents and read the attribute documents (names) of the container files
  3. Match the address of the content document address received by each
  4. The output is the compliance of the "File Name" -\u003e "Content Address"

Reading files

  1. By file name, get from the table of contents the address of the content document
  2. Collect the content document from blocks
  3. If this is a root container, then you can unpack the content document (it is compressed)
  4. Ready. The result obtained is the data of the desired file.

Update from 25.02.2014

Finally

This article is not the truth in the last instance, it is likely that it even has errors. Nevertheless, if this topic is interesting to you, then I hope that this article will help you in the implementation of your projects. Good luck!

Have questions?

Report typos

The text that will be sent to our editors: