DataMuseum.dk

Presents historical artifacts from the history of:

CP/M

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CP/M

Excavated with: AutoArchaeologist - Free & Open Source Software.


top
Index: ┃ 0 5 B C D E H I L M N P R S T

⟦008b0000c⟧ Bits:30002786 SW1500 Concurrent DOS SYSTEM DISKETTE 4.2 - disk 3/3, 5¼" Floppy Disk, CpmFSAuto

    Length: 1261568 (0x134000)
    Description: Bits:30002786 SW1500 Concurrent DOS SYSTEM DISKETTE 4.2 - disk 3/3
    Types: 5¼" Floppy Disk, CpmFSAuto
    Notes: CpmFSAuto,1024,2048,512,0x0,1<2<3,2:0-76:1

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         CpmFSAuto,1024,2048,512,0x0,1<2<3,2:0-76:1
Confidence score:  +43/-1
Sector size:       1024
Block size:        2048
Directory entries: 512
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 4, 7, 2, 5, 8, 3, 6
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0 0 10240 BATCH.CMD ⟦23237b5f9⟧
0 0 2432 CHDIR.CMD ⟦da605220b⟧
0 0 21760 CHSET.CMD ⟦623a768bf⟧
0 0 28672 COPY.EXE ⟦28cefd730⟧
0 0 2560 DATE.EXE ⟦8ce8ba8e7⟧ 0x00[0xa00]
0 0 2432 ERA.CMD ⟦6cfee0e79⟧
0 0 3968 ERAQ.CMD ⟦b1ccc1eec⟧
0 0 1536 ERASE.EXE ⟦f5c6856a0⟧
0 0 7680 HELP.CMD ⟦f216a2d39⟧
0 0 41984 HELP.HLP ⟦45e9ed6ec⟧
0 0 36992 INITDIR.CMD ⟦b576c80df⟧
0 0 11392 LOCAL.CMD ⟦67740e81a⟧
0 0 16384 LOGOFF.CMD ⟦86a38da60⟧
0 0 18304 LOGON.CMD ⟦e155155cc⟧
0 0 2304 MKDIR.CMD ⟦9a33f497d⟧
0 0 15872 NAMES.CMD ⟦7b551fbfb⟧
0 0 22784 NAMESMOD.CMD ⟦ac2a57ea3⟧
0 0 17536 NET.CMD ⟦ab26296bf⟧
0 0 16256 NETOFF.CMD ⟦11520bf2e⟧
0 0 16384 NETON.CMD ⟦166f6d125⟧
0 0 17920 NETSTAT.CMD ⟦754b4c316⟧
0 0 2560 PATH.EXE ⟦af696122a⟧
0 0 9344 PIP.CMD ⟦d14331717⟧
0 0 2048 REN.EXE ⟦89e617d0f⟧
0 0 2176 RMDIR.CMD ⟦81ba98739⟧
0 0 13312 SDIR.CMD ⟦3d6b13af1⟧
0 0 7680 SET.CMD ⟦2eec9f63b⟧
0 0 7424 SHOW.CMD ⟦b333c5394⟧
0 0 7168 STOP.CMD ⟦0ec4d3ea6⟧
0 0 2304 SYSDISK.CMD ⟦5012bb94a⟧
0 0 2048 TIME.EXE ⟦cb3e8355b⟧
0 0 2048 TYPE.CMD ⟦f54c3af4b⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 8]]

First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x8000 26-21-2-2-2-2-2-2
   (2, 1)  0xa000 2-2-2-2-2-2-2-2

Total credibility: 59

Block number width: ok16

   8     0     8   202   153  False
  16     0     8   202     0  False

00:HELP    CMD rc=0x03c c=0x004 ProbeDirEnt {status=0x00, name=»HELP    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=080009000a000b000000000000000000}
00:HELP    HLP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»HELP    HLP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0c000d000e000f001000110012001300}
00:HELP    HLP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»HELP    HLP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=1400150016001700180019001a001b00}
00:HELP    HLP rc=0x048 c=0x005 ProbeDirEnt {status=0x00, name=»HELP    HLP«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=1c001d001e001f002000000000000000}
00:SET     CMD rc=0x03c c=0x004 ProbeDirEnt {status=0x00, name=»SET     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=21002200230024000000000000000000}
00:STOP    CMD rc=0x038 c=0x004 ProbeDirEnt {status=0x00, name=»STOP    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x38, al=25002600270028000000000000000000}
00:ERAQ    CMD rc=0x01f c=0x002 ProbeDirEnt {status=0x00, name=»ERAQ    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x1f, al=29002a00000000000000000000000000}
00:ERA     CMD rc=0x013 c=0x002 ProbeDirEnt {status=0x00, name=»ERA     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x13, al=2b002c00000000000000000000000000}
00:SDIR    CMD rc=0x068 c=0x007 ProbeDirEnt {status=0x00, name=»SDIR    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x68, al=2d002e002f0030003100320033000000}
00:SHOW    CMD rc=0x03a c=0x004 ProbeDirEnt {status=0x00, name=»SHOW    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=34003500360037000000000000000000}
00:PATH    EXE rc=0x014 c=0x002 ProbeDirEnt {status=0x00, name=»PATH    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x14, al=38003900000000000000000000000000}
00:BATCH   CMD rc=0x050 c=0x005 ProbeDirEnt {status=0x00, name=»BATCH   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x50, al=3a003b003c003d003e00000000000000}
00:CHDIR   CMD rc=0x013 c=0x002 ProbeDirEnt {status=0x00, name=»CHDIR   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x13, al=3f004000000000000000000000000000}
00:COPY    EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»COPY    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=41004200430044004500460047004800}
00:COPY    EXE rc=0x060 c=0x006 ProbeDirEnt {status=0x00, name=»COPY    EXE«, xl=0x01, bc=0x00, xh=0x00, rc=0x60, al=49004a004b004c004d004e0000000000}
00:DATE    EXE rc=0x014 c=0x002 ProbeDirEnt {status=0x00, name=»DATE    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x14, al=4f005000000000000000000000000000}
00:ERASE   EXE rc=0x00c c=0x001 ProbeDirEnt {status=0x00, name=»ERASE   EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x0c, al=51000000000000000000000000000000}
00:MKDIR   CMD rc=0x012 c=0x002 ProbeDirEnt {status=0x00, name=»MKDIR   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x12, al=52005300000000000000000000000000}
00:PIP     CMD rc=0x049 c=0x005 ProbeDirEnt {status=0x00, name=»PIP     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x49, al=54005500560057005800000000000000}
00:RMDIR   CMD rc=0x011 c=0x002 ProbeDirEnt {status=0x00, name=»RMDIR   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x11, al=59005a00000000000000000000000000}
00:REN     EXE rc=0x010 c=0x001 ProbeDirEnt {status=0x00, name=»REN     EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=5b000000000000000000000000000000}
00:SYSDISK CMD rc=0x012 c=0x002 ProbeDirEnt {status=0x00, name=»SYSDISK CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x12, al=5c005d00000000000000000000000000}
00:TIME    EXE rc=0x010 c=0x001 ProbeDirEnt {status=0x00, name=»TIME    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=5e000000000000000000000000000000}
00:TYPE    CMD rc=0x010 c=0x001 ProbeDirEnt {status=0x00, name=»TYPE    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=5f000000000000000000000000000000}
00:CHSET   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CHSET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700}
00:CHSET   CMD rc=0x02a c=0x003 ProbeDirEnt {status=0x00, name=»CHSET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x2a, al=680069006a0000000000000000000000}
00:INITDIR CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=6b006c006d006e006f00700071007200}
00:INITDIR CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=73007400750076007700780079007a00}
00:INITDIR CMD rc=0x021 c=0x003 ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x21, al=7b007c007d0000000000000000000000}
00:NETON   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7e007f00800081008200830084008500}
00:NETOFF  CMD rc=0x07f c=0x008 ProbeDirEnt {status=0x00, name=»NETOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7f, al=86008700880089008a008b008c008d00}
00:LOGON   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8e008f00900091009200930094009500}
00:LOGON   CMD rc=0x00f c=0x001 ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0f, al=96000000000000000000000000000000}
00:LOGOFF  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9700980099009a009b009c009d009e00}
00:NET     CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9f00a000a100a200a300a400a500a600}
00:NET     CMD rc=0x009 c=0x001 ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=a7000000000000000000000000000000}
00:LOCAL   CMD rc=0x059 c=0x006 ProbeDirEnt {status=0x00, name=»LOCAL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=a800a900aa00ab00ac00ad0000000000}
00:NAMES   CMD rc=0x07c c=0x008 ProbeDirEnt {status=0x00, name=»NAMES   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7c, al=ae00af00b000b100b200b300b400b500}
00:NAMESMODCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b600b700b800b900ba00bb00bc00bd00}
00:NAMESMODCMD rc=0x032 c=0x004 ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x32, al=be00bf00c000c1000000000000000000}
00:NETSTAT CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c200c300c400c500c600c700c800c900}
00:NETSTAT CMD rc=0x00c c=0x001 ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=ca000000000000000000000000000000}
Block Size 2048.00 2048 extent_mask = 0x0

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5-6-7-8)                                                         [25, 20, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +42/-0
     19  normal-2     (1-3-5-7-2-4-6-8)                                                         [25, 1, 1, 1, 20, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +42/-0
     19  normal-3     (1-4-7-2-5-8-3-6)                                                         [25, 1, 1, 20, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +43/-1
From the beastiarium: CpmFSCr16   +0/-0

File & label names found:
  0x0008000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»           «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000360c0945360c0945}
    ProbeDirEnt {status=0x00, name=»HELP    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=080009000a000b000000000000000000}
    ProbeDirEnt {status=0x00, name=»HELP    HLP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0c000d000e000f001000110012001300}
    ProbeDirEnt {status=0x00, name=»HELP    HLP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=1400150016001700180019001a001b00}
    ProbeDirEnt {status=0x00, name=»HELP    HLP«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=1c001d001e001f002000000000000000}
    ProbeDirEnt {status=0x00, name=»SET     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=21002200230024000000000000000000}
    ProbeDirEnt {status=0x00, name=»STOP    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x38, al=25002600270028000000000000000000}
    ProbeDirEnt {status=0x00, name=»ERAQ    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x1f, al=29002a00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»ERA     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x13, al=2b002c00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SDIR    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x68, al=2d002e002f0030003100320033000000}
    ProbeDirEnt {status=0x00, name=»SHOW    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=34003500360037000000000000000000}
    ProbeDirEnt {status=0x00, name=»PATH    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x14, al=38003900000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»BATCH   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x50, al=3a003b003c003d003e00000000000000}
    ProbeDirEnt {status=0x00, name=»CHDIR   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x13, al=3f004000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»COPY    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=41004200430044004500460047004800}
    ProbeDirEnt {status=0x00, name=»COPY    EXE«, xl=0x01, bc=0x00, xh=0x00, rc=0x60, al=49004a004b004c004d004e0000000000}
    ProbeDirEnt {status=0x00, name=»DATE    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x14, al=4f005000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»ERASE   EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x0c, al=51000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MKDIR   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x12, al=52005300000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PIP     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x49, al=54005500560057005800000000000000}
    ProbeDirEnt {status=0x00, name=»RMDIR   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x11, al=59005a00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»REN     EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=5b000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SYSDISK CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x12, al=5c005d00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TIME    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=5e000000000000000000000000000000}
  0x0008400 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»TYPE    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=5f000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CHSET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700}
    ProbeDirEnt {status=0x00, name=»CHSET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x2a, al=680069006a0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=6b006c006d006e006f00700071007200}
    ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=73007400750076007700780079007a00}
    ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x21, al=7b007c007d0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7e007f00800081008200830084008500}
    ProbeDirEnt {status=0x00, name=»NETOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7f, al=86008700880089008a008b008c008d00}
    ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8e008f00900091009200930094009500}
    ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0f, al=96000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9700980099009a009b009c009d009e00}
    ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9f00a000a100a200a300a400a500a600}
    ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=a7000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»LOCAL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=a800a900aa00ab00ac00ad0000000000}
    ProbeDirEnt {status=0x00, name=»NAMES   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7c, al=ae00af00b000b100b200b300b400b500}
    ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b600b700b800b900ba00bb00bc00bd00}
    ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x32, al=be00bf00c000c1000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c200c300c400c500c600c700c800c900}
    ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=ca000000000000000000000000000000}
  0x0008800 (2, 0, 3)
  0x0008c00 (2, 0, 4)
  0x0009000 (2, 0, 5)
  0x0009400 (2, 0, 6)
  0x0009800 (2, 0, 7)
  0x0009c00 (2, 0, 8)
  0x000a000 (2, 1, 1)
  0x000a400 (2, 1, 2)
  0x000a800 (2, 1, 3)
  0x000ac00 (2, 1, 4)
  0x000b000 (2, 1, 5)
  0x000b400 (2, 1, 6)
  0x000b800 (2, 1, 7)
  0x000bc00 (2, 1, 8)
+  43 -   1 <Tree 0x0-0x9a000-0x134000>
+  42 -   0 <Tree 0x0-0x9a000-0x134000>

Full View