|
DataMuseum.dkPresents historical artifacts from the history of: CP/M |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about CP/M Excavated with: AutoArchaeologist - Free & Open Source Software. |
topIndex: ┃ 5 B C D E H I L M N P R S T ┃
Length: 1261568 (0x134000) Description: Bits:30002698 SW1458 Concurrent DOS Distributionsdiskette 4.0 - disk 3/3 Types: 5¼" Floppy Disk, CpmFSAuto Notes: CpmFSAuto,1024,2048,512,0x0,1<2,2:0-76:1
Media: [0, 0, 1] … [76, 1, 8] {1024: 1232} Signature: CpmFSAuto,1024,2048,512,0x0,1<2,2:0-76:1 Confidence score: +43/-10 Sector size: 1024 Block size: 2048 Directory entries: 512 Block number size: 16 Extent-mask: 0x00 Sector-interleave: 1, 3, 5, 7, 2, 4, 6, 8 Tracks: (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user | bc | length | name | artifact |
---|---|---|---|---|
0 | 0 | 10240 | BATCH.CMD | ⟦97b4668b3⟧ |
0 | 0 | 2432 | CHDIR.CMD | ⟦d416e4407⟧ |
0 | 0 | 21760 | CHSET.CMD | ⟦7e640568b⟧ |
0 | 0 | 28672 | COPY.EXE | ⟦3067bb8f2⟧ |
0 | 0 | 2560 | DATE.EXE | ⟦423b6b1d0⟧ |
0 | 0 | 2432 | ERA.CMD | ⟦760e9effd⟧ |
0 | 0 | 3968 | ERAQ.CMD | ⟦cdbf631d0⟧ |
0 | 0 | 1536 | ERASE.EXE | ⟦2fb2ee10a⟧ |
0 | 0 | 7680 | HELP.CMD | ⟦836caaa0f⟧ |
0 | 0 | 41984 | HELP.HLP | ⟦6db2d3ee9⟧ |
0 | 0 | 36992 | INITDIR.CMD | ⟦8f727d1e0⟧ |
0 | 0 | 11392 | LOCAL.CMD | ⟦3fa65a8ef⟧ |
0 | 0 | 16384 | LOGOFF.CMD | ⟦2512c247b⟧ |
0 | 0 | 18304 | LOGON.CMD | ⟦44acf63c8⟧ |
0 | 0 | 2304 | MKDIR.CMD | ⟦a77371c3b⟧ |
0 | 0 | 15872 | NAMES.CMD | ⟦fb2de1f72⟧ |
0 | 0 | 22784 | NAMESMOD.CMD | ⟦eeafaad18⟧ |
0 | 0 | 17536 | NET.CMD | ⟦2ced258a1⟧ |
0 | 0 | 16256 | NETOFF.CMD | ⟦83a5cc826⟧ |
0 | 0 | 16384 | NETON.CMD | ⟦41e4f4eb6⟧ |
0 | 0 | 17920 | NETSTAT.CMD | ⟦5d297eb7f⟧ |
0 | 0 | 2560 | PATH.EXE | ⟦e45f2edf3⟧ |
0 | 0 | 9344 | PIP.CMD | ⟦520cf8aad⟧ |
0 | 0 | 2048 | REN.EXE | ⟦a5eaa1938⟧ |
0 | 0 | 2176 | RMDIR.CMD | ⟦c9410bb4b⟧ TextFile |
0 | 0 | 13312 | SDIR.CMD | ⟦7c02ae873⟧ |
0 | 0 | 7680 | SET.CMD | ⟦229a7efd5⟧ |
0 | 0 | 7424 | SHOW.CMD | ⟦ad88087b5⟧ |
0 | 0 | 7168 | STOP.CMD | ⟦e28266734⟧ |
0 | 0 | 2304 | SYSDISK.CMD | ⟦b0f854316⟧ |
0 | 0 | 2048 | TIME.EXE | ⟦0f06d37f7⟧ |
0 | 0 | 2048 | TYPE.CMD | ⟦d7efb692a⟧ |
Geometry: [[0, 0, 1], [76, 1, 8]] First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records Credible directory tracks: (2, 0) 0x8000 26-21-2-2-2-2-2-2 (2, 1) 0xa000 2-2-2-2-2-2-2-2 Total credibility: 59 Block number width: ok16 8 0 8 202 153 False 16 0 8 202 0 False 00:HELP CMD rc=0x03c c=0x004 ProbeDirEnt {status=0x00, name=»HELP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=080009000a000b000000000000000000} 00:HELP HLP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»HELP HLP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0c000d000e000f001000110012001300} 00:HELP HLP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»HELP HLP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=1400150016001700180019001a001b00} 00:HELP HLP rc=0x048 c=0x005 ProbeDirEnt {status=0x00, name=»HELP HLP«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=1c001d001e001f002000000000000000} 00:SET CMD rc=0x03c c=0x004 ProbeDirEnt {status=0x00, name=»SET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=21002200230024000000000000000000} 00:STOP CMD rc=0x038 c=0x004 ProbeDirEnt {status=0x00, name=»STOP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x38, al=25002600270028000000000000000000} 00:ERAQ CMD rc=0x01f c=0x002 ProbeDirEnt {status=0x00, name=»ERAQ CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x1f, al=29002a00000000000000000000000000} 00:ERA CMD rc=0x013 c=0x002 ProbeDirEnt {status=0x00, name=»ERA CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x13, al=2b002c00000000000000000000000000} 00:SDIR CMD rc=0x068 c=0x007 ProbeDirEnt {status=0x00, name=»SDIR CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x68, al=2d002e002f0030003100320033000000} 00:SHOW CMD rc=0x03a c=0x004 ProbeDirEnt {status=0x00, name=»SHOW CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=34003500360037000000000000000000} 00:PATH EXE rc=0x014 c=0x002 ProbeDirEnt {status=0x00, name=»PATH EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x14, al=38003900000000000000000000000000} 00:BATCH CMD rc=0x050 c=0x005 ProbeDirEnt {status=0x00, name=»BATCH CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x50, al=3a003b003c003d003e00000000000000} 00:CHDIR CMD rc=0x013 c=0x002 ProbeDirEnt {status=0x00, name=»CHDIR CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x13, al=3f004000000000000000000000000000} 00:COPY EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»COPY EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=41004200430044004500460047004800} 00:COPY EXE rc=0x060 c=0x006 ProbeDirEnt {status=0x00, name=»COPY EXE«, xl=0x01, bc=0x00, xh=0x00, rc=0x60, al=49004a004b004c004d004e0000000000} 00:DATE EXE rc=0x014 c=0x002 ProbeDirEnt {status=0x00, name=»DATE EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x14, al=4f005000000000000000000000000000} 00:ERASE EXE rc=0x00c c=0x001 ProbeDirEnt {status=0x00, name=»ERASE EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x0c, al=51000000000000000000000000000000} 00:MKDIR CMD rc=0x012 c=0x002 ProbeDirEnt {status=0x00, name=»MKDIR CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x12, al=52005300000000000000000000000000} 00:PIP CMD rc=0x049 c=0x005 ProbeDirEnt {status=0x00, name=»PIP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x49, al=54005500560057005800000000000000} 00:RMDIR CMD rc=0x011 c=0x002 ProbeDirEnt {status=0x00, name=»RMDIR CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x11, al=59005a00000000000000000000000000} 00:REN EXE rc=0x010 c=0x001 ProbeDirEnt {status=0x00, name=»REN EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=5b000000000000000000000000000000} 00:SYSDISK CMD rc=0x012 c=0x002 ProbeDirEnt {status=0x00, name=»SYSDISK CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x12, al=5c005d00000000000000000000000000} 00:TIME EXE rc=0x010 c=0x001 ProbeDirEnt {status=0x00, name=»TIME EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=5e000000000000000000000000000000} 00:TYPE CMD rc=0x010 c=0x001 ProbeDirEnt {status=0x00, name=»TYPE CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=5f000000000000000000000000000000} 00:CHSET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CHSET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700} 00:CHSET CMD rc=0x02a c=0x003 ProbeDirEnt {status=0x00, name=»CHSET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x2a, al=680069006a0000000000000000000000} 00:INITDIR CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=6b006c006d006e006f00700071007200} 00:INITDIR CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=73007400750076007700780079007a00} 00:INITDIR CMD rc=0x021 c=0x003 ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x21, al=7b007c007d0000000000000000000000} 00:NETON CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7e007f00800081008200830084008500} 00:NETOFF CMD rc=0x07f c=0x008 ProbeDirEnt {status=0x00, name=»NETOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7f, al=86008700880089008a008b008c008d00} 00:LOGON CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8e008f00900091009200930094009500} 00:LOGON CMD rc=0x00f c=0x001 ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0f, al=96000000000000000000000000000000} 00:LOGOFF CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9700980099009a009b009c009d009e00} 00:NET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9f00a000a100a200a300a400a500a600} 00:NET CMD rc=0x009 c=0x001 ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=a7000000000000000000000000000000} 00:LOCAL CMD rc=0x059 c=0x006 ProbeDirEnt {status=0x00, name=»LOCAL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=a800a900aa00ab00ac00ad0000000000} 00:NAMES CMD rc=0x07c c=0x008 ProbeDirEnt {status=0x00, name=»NAMES CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7c, al=ae00af00b000b100b200b300b400b500} 00:NAMESMODCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b600b700b800b900ba00bb00bc00bd00} 00:NAMESMODCMD rc=0x032 c=0x004 ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x32, al=be00bf00c000c1000000000000000000} 00:NETSTAT CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c200c300c400c500c600c700c800c900} 00:NETSTAT CMD rc=0x00c c=0x001 ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=ca000000000000000000000000000000} Block Size 2048.00 2048 extent_mask = 0x0 Candidate interleaves in order of directory credibility: Penalty Name Order Resulting dir order 0 normal-1 (1-2-3-4-5-6-7-8) [25, 20, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +42/-0 19 normal-2 (1-3-5-7-2-4-6-8) [25, 1, 1, 1, 20, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +43/-10 19 normal-3 (1-4-7-2-5-8-3-6) [25, 1, 1, 20, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +43/-12 From the beastiarium: CpmFSCr16 +0/-0 File & label names found: 0x0008000 (2, 0, 1) ProbeDirEnt {status=0x20, name=»Rel4-0 D3/3«, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000010d1345010d1345} ProbeDirEnt {status=0x00, name=»HELP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=080009000a000b000000000000000000} ProbeDirEnt {status=0x00, name=»HELP HLP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0c000d000e000f001000110012001300} ProbeDirEnt {status=0x00, name=»HELP HLP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=1400150016001700180019001a001b00} ProbeDirEnt {status=0x00, name=»HELP HLP«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=1c001d001e001f002000000000000000} ProbeDirEnt {status=0x00, name=»SET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=21002200230024000000000000000000} ProbeDirEnt {status=0x00, name=»STOP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x38, al=25002600270028000000000000000000} ProbeDirEnt {status=0x00, name=»ERAQ CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x1f, al=29002a00000000000000000000000000} ProbeDirEnt {status=0x00, name=»ERA CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x13, al=2b002c00000000000000000000000000} ProbeDirEnt {status=0x00, name=»SDIR CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x68, al=2d002e002f0030003100320033000000} ProbeDirEnt {status=0x00, name=»SHOW CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=34003500360037000000000000000000} ProbeDirEnt {status=0x00, name=»PATH EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x14, al=38003900000000000000000000000000} ProbeDirEnt {status=0x00, name=»BATCH CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x50, al=3a003b003c003d003e00000000000000} ProbeDirEnt {status=0x00, name=»CHDIR CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x13, al=3f004000000000000000000000000000} ProbeDirEnt {status=0x00, name=»COPY EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=41004200430044004500460047004800} ProbeDirEnt {status=0x00, name=»COPY EXE«, xl=0x01, bc=0x00, xh=0x00, rc=0x60, al=49004a004b004c004d004e0000000000} ProbeDirEnt {status=0x00, name=»DATE EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x14, al=4f005000000000000000000000000000} ProbeDirEnt {status=0x00, name=»ERASE EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x0c, al=51000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»MKDIR CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x12, al=52005300000000000000000000000000} ProbeDirEnt {status=0x00, name=»PIP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x49, al=54005500560057005800000000000000} ProbeDirEnt {status=0x00, name=»RMDIR CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x11, al=59005a00000000000000000000000000} ProbeDirEnt {status=0x00, name=»REN EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=5b000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»SYSDISK CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x12, al=5c005d00000000000000000000000000} ProbeDirEnt {status=0x00, name=»TIME EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=5e000000000000000000000000000000} 0x0008400 (2, 0, 2) ProbeDirEnt {status=0x00, name=»TYPE CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=5f000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»CHSET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700} ProbeDirEnt {status=0x00, name=»CHSET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x2a, al=680069006a0000000000000000000000} ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=6b006c006d006e006f00700071007200} ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=73007400750076007700780079007a00} ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x21, al=7b007c007d0000000000000000000000} ProbeDirEnt {status=0x00, name=»NETON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7e007f00800081008200830084008500} ProbeDirEnt {status=0x00, name=»NETOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7f, al=86008700880089008a008b008c008d00} ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8e008f00900091009200930094009500} ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0f, al=96000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9700980099009a009b009c009d009e00} ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9f00a000a100a200a300a400a500a600} ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=a7000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»LOCAL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=a800a900aa00ab00ac00ad0000000000} ProbeDirEnt {status=0x00, name=»NAMES CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7c, al=ae00af00b000b100b200b300b400b500} ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b600b700b800b900ba00bb00bc00bd00} ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x32, al=be00bf00c000c1000000000000000000} ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c200c300c400c500c600c700c800c900} ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=ca000000000000000000000000000000} 0x0008800 (2, 0, 3) 0x0008c00 (2, 0, 4) 0x0009000 (2, 0, 5) 0x0009400 (2, 0, 6) 0x0009800 (2, 0, 7) 0x0009c00 (2, 0, 8) 0x000a000 (2, 1, 1) 0x000a400 (2, 1, 2) 0x000a800 (2, 1, 3) 0x000ac00 (2, 1, 4) 0x000b000 (2, 1, 5) 0x000b400 (2, 1, 6) 0x000b800 (2, 1, 7) 0x000bc00 (2, 1, 8) + 43 - 10 <Tree 0x0-0x9a000-0x134000> + 43 - 12 <Tree 0x0-0x9a000-0x134000>