DataMuseum.dk

Presents historical artifacts from the history of:

CP/M

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CP/M

Excavated with: AutoArchaeologist - Free & Open Source Software.


top
Index: ┃ 5 7 C I K S T V

⟦47c2467e0⟧ Bits:30003943 SW1544 VISTA Database Rel. 1.1, 5¼" Floppy Disk, CpmFSAuto, ImdContainer

    Length: 1261568 (0x134000)
    Description: Bits:30003943 SW1544 VISTA Database Rel. 1.1
    Types: 5¼" Floppy Disk, CpmFSAuto, ImdContainer
    Notes: CpmFSAuto,1024,2048,512,0x0,1,2:0-76:1, CpmFSAuto,1024,2048,512,0x0,1<2,2:0-76:1

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         CpmFSAuto,1024,2048,512,0x0,1,2:0-76:1
Confidence score:  +37/-0
Sector size:       1024
Block size:        2048
Directory entries: 512
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0 0 1152 7BIT.POF ⟦cc571c96b⟧
0 0 1152 IBM.POF ⟦c2b05b3d0⟧
0 0 512 INSTJOB.SUB ⟦39b8b81d2⟧ TextFile
0 0 1152 KARAKTER.POF ⟦ced251668⟧
0 0 81664 SKEMA.EXE ⟦9a3b7181c⟧
0 0 210304 VIPS.EXE ⟦fc1f5f867⟧
0 0 146432 VISETUP.VSF ⟦abdd745ce⟧
0 0 640 VISTA.SYS ⟦e04699c57⟧
0 0 71808 VISUP.EXE ⟦00b636183⟧

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         CpmFSAuto,1024,2048,512,0x0,1<2,2:0-76:1
Confidence score:  +37/-0
Sector size:       1024
Block size:        2048
Directory entries: 512
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 3, 5, 7, 2, 4, 6, 8
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0 0 1152 7BIT.POF ⟦dff9fd7a1⟧
0 0 1152 IBM.POF ⟦e056c3197⟧
0 0 512 INSTJOB.SUB ⟦a81bf4818⟧
0 0 1152 KARAKTER.POF ⟦5f1acabcd⟧
0 0 81664 SKEMA.EXE ⟦d88052321⟧
0 0 210304 VIPS.EXE ⟦27a4cd3e3⟧
0 0 146432 VISETUP.VSF ⟦262033827⟧
0 0 640 VISTA.SYS ⟦7e390c065⟧
0 0 71808 VISUP.EXE ⟦f6e4adc61⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 8]]

First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x8000 25-17-2-2-2-2-2-2
   (2, 1)  0xa000 2-2-2-2-2-2-2-2

Total credibility: 54

Block number width: ok16

   8    83     1   191   156  False
  16     0     8   331     0  False

00:IBM     POF rc=0x009 c=0x001 ProbeDirEnt {status=0x00, name=»IBM     POF«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=08000000000000000000000000000000}
00:SKEMA   EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=09000a000b000c000d000e000f001000}
00:SKEMA   EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=11001200130014001500160017001800}
00:SKEMA   EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=19001a001b001c001d001e001f002000}
00:SKEMA   EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=21002200230024002500260027002800}
00:SKEMA   EXE rc=0x07e c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x04, bc=0x00, xh=0x00, rc=0x7e, al=29002a002b002c002d002e002f003000}
00:VISUP   EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=31003200330034003500360037003800}
00:VISUP   EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=39003a003b003c003d003e003f004000}
00:VISUP   EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=41004200430044004500460047004800}
00:VISUP   EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=49004a004b004c004d004e004f005000}
00:VISUP   EXE rc=0x031 c=0x004 ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x04, bc=0x00, xh=0x00, rc=0x31, al=51005200530054000000000000000000}
00:KARAKTERPOF rc=0x009 c=0x001 ProbeDirEnt {status=0x00, name=»KARAKTERPOF«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=55000000000000000000000000000000}
00:VIPS    EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00}
00:VIPS    EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700}
00:VIPS    EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00}
00:VIPS    EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=70007100720073007400750076007700}
00:VIPS    EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=780079007a007b007c007d007e007f00}
00:VIPS    EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=80008100820083008400850086008700}
00:VIPS    EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=880089008a008b008c008d008e008f00}
00:VIPS    EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=90009100920093009400950096009700}
00:VIPS    EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=980099009a009b009c009d009e009f00}
00:VIPS    EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=a000a100a200a300a400a500a600a700}
00:VIPS    EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x0a, bc=0x00, xh=0x00, rc=0x80, al=a800a900aa00ab00ac00ad00ae00af00}
00:VIPS    EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x0b, bc=0x00, xh=0x00, rc=0x80, al=b000b100b200b300b400b500b600b700}
00:VIPS    EXE rc=0x06b c=0x007 ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x0c, bc=0x00, xh=0x00, rc=0x6b, al=b800b900ba00bb00bc00bd00be000000}
00:VISTA   SYS rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»VISTA   SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=bf000000000000000000000000000000}
00:7BIT    POF rc=0x009 c=0x001 ProbeDirEnt {status=0x00, name=»7BIT    POF«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=02010000000000000000000000000000}
00:INSTJOB SUB rc=0x004 c=0x001 ProbeDirEnt {status=0x00, name=»INSTJOB SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x04, al=03010000000000000000000000000000}
00:VISETUP VSF rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0401050106010701080109010a010b01}
00:VISETUP VSF rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=0c010d010e010f011001110112011301}
00:VISETUP VSF rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=1401150116011701180119011a011b01}
00:VISETUP VSF rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=1c011d011e011f012001210122012301}
00:VISETUP VSF rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=2401250126012701280129012a012b01}
00:VISETUP VSF rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=2c012d012e012f013001310132013301}
00:VISETUP VSF rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=3401350136013701380139013a013b01}
00:VISETUP VSF rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=3c013d013e013f014001410142014301}
00:VISETUP VSF rc=0x078 c=0x008 ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x08, bc=0x00, xh=0x00, rc=0x78, al=4401450146014701480149014a014b01}
Block Size 2048.00 2048 extent_mask = 0x0

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5-6-7-8)                                                         [24, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +37/-0
     15  normal-2     (1-3-5-7-2-4-6-8)                                                         [24, 1, 1, 1, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +37/-0
     15  normal-3     (1-4-7-2-5-8-3-6)                                                         [24, 1, 1, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +37/-1
From the beastiarium: CpmFSCr16   +0/-0

File & label names found:
  0x0008000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»SW1544 1.1 «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000560d1954560d1954}
    ProbeDirEnt {status=0x00, name=»IBM     POF«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=08000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=09000a000b000c000d000e000f001000}
    ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=11001200130014001500160017001800}
    ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=19001a001b001c001d001e001f002000}
    ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=21002200230024002500260027002800}
    ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x04, bc=0x00, xh=0x00, rc=0x7e, al=29002a002b002c002d002e002f003000}
    ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=31003200330034003500360037003800}
    ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=39003a003b003c003d003e003f004000}
    ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=41004200430044004500460047004800}
    ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=49004a004b004c004d004e004f005000}
    ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x04, bc=0x00, xh=0x00, rc=0x31, al=51005200530054000000000000000000}
    ProbeDirEnt {status=0x00, name=»KARAKTERPOF«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=55000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=70007100720073007400750076007700}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=780079007a007b007c007d007e007f00}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=80008100820083008400850086008700}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=880089008a008b008c008d008e008f00}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=90009100920093009400950096009700}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=980099009a009b009c009d009e009f00}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=a000a100a200a300a400a500a600a700}
  0x0008400 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x0a, bc=0x00, xh=0x00, rc=0x80, al=a800a900aa00ab00ac00ad00ae00af00}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x0b, bc=0x00, xh=0x00, rc=0x80, al=b000b100b200b300b400b500b600b700}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x0c, bc=0x00, xh=0x00, rc=0x6b, al=b800b900ba00bb00bc00bd00be000000}
    ProbeDirEnt {status=0x00, name=»VISTA   SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=bf000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»7BIT    POF«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=02010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»INSTJOB SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x04, al=03010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0401050106010701080109010a010b01}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=0c010d010e010f011001110112011301}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=1401150116011701180119011a011b01}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=1c011d011e011f012001210122012301}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=2401250126012701280129012a012b01}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=2c012d012e012f013001310132013301}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=3401350136013701380139013a013b01}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=3c013d013e013f014001410142014301}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x08, bc=0x00, xh=0x00, rc=0x78, al=4401450146014701480149014a014b01}
  0x0008800 (2, 0, 3)
  0x0008c00 (2, 0, 4)
  0x0009000 (2, 0, 5)
  0x0009400 (2, 0, 6)
  0x0009800 (2, 0, 7)
  0x0009c00 (2, 0, 8)
  0x000a000 (2, 1, 1)
  0x000a400 (2, 1, 2)
  0x000a800 (2, 1, 3)
  0x000ac00 (2, 1, 4)
  0x000b000 (2, 1, 5)
  0x000b400 (2, 1, 6)
  0x000b800 (2, 1, 7)
  0x000bc00 (2, 1, 8)
+  37 -   0 <Tree 0x0-0x9a000-0x134000>
+  37 -   0 <Tree 0x0-0x9a000-0x134000>
+  37 -   1 <Tree 0x0-0x9a000-0x134000>

Full View