DataMuseum.dk

Presents historical artifacts from the history of:

CP/M

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CP/M

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - download

⟦794f6bc94⟧ Bits:30002715 SW1544 VISTA I Rel 1.1, 5¼" Floppy Disk

    Length: 203776 (0x31c00)
    Description: Bits:30002715 SW1544 VISTA I Rel 1.1
    Types: 5¼" Floppy Disk

CP/M filesystem probe

Geometry: [[0, 0, 1], [79, 1, 15]]

First credible dirsect is: (2, 0, 1) at 0x1000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x1000 25
   (2, 1)  0x1400 2

Total credibility: 25

Block number width: ok16

   8     0     8   160   136  False
  16     0     8   167     0  False

00:IBM     POF rc=0x009 c=0x001 ProbeDirEnt {status=0x00, name=»IBM     POF«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=08000000000000000000000000000000}
00:SKEMA   EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=09000a000b000c000d000e000f001000}
00:SKEMA   EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=11001200130014001500160017001800}
00:SKEMA   EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=19001a001b001c001d001e001f002000}
00:SKEMA   EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=21002200230024002500260027002800}
00:SKEMA   EXE rc=0x07e c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x04, bc=0x00, xh=0x00, rc=0x7e, al=29002a002b002c002d002e002f003000}
00:VISUP   EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=31003200330034003500360037003800}
00:VISUP   EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=39003a003b003c003d003e003f004000}
00:VISUP   EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=41004200430044004500460047004800}
00:VISUP   EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=49004a004b004c004d004e004f005000}
00:VISUP   EXE rc=0x031 c=0x004 ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x04, bc=0x00, xh=0x00, rc=0x31, al=51005200530054000000000000000000}
00:KARAKTERPOF rc=0x009 c=0x001 ProbeDirEnt {status=0x00, name=»KARAKTERPOF«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=55000000000000000000000000000000}
00:VIPS    EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00}
00:VIPS    EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700}
00:VIPS    EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00}
00:VIPS    EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=70007100720073007400750076007700}
00:VIPS    EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=780079007a007b007c007d007e007f00}
00:VIPS    EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=80008100820083008400850086008700}
00:VIPS    EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=880089008a008b008c008d008e008f00}
00:VIPS    EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=90009100920093009400950096009700}
00:VIPS    EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=980099009a009b009c009d009e009f00}
00:VIPS    EXE rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=a000a100a200a300a400a500a600a700}
Block Size 2048.00 2048 extent_mask = 0x0

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order

File & label names found:
  (Using no interleave)
  0x0001000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»SW1544 1.1 «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000560d1954560d1954}
    ProbeDirEnt {status=0x00, name=»IBM     POF«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=08000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=09000a000b000c000d000e000f001000}
    ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=11001200130014001500160017001800}
    ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=19001a001b001c001d001e001f002000}
    ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=21002200230024002500260027002800}
    ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x04, bc=0x00, xh=0x00, rc=0x7e, al=29002a002b002c002d002e002f003000}
    ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=31003200330034003500360037003800}
    ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=39003a003b003c003d003e003f004000}
    ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=41004200430044004500460047004800}
    ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=49004a004b004c004d004e004f005000}
    ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x04, bc=0x00, xh=0x00, rc=0x31, al=51005200530054000000000000000000}
    ProbeDirEnt {status=0x00, name=»KARAKTERPOF«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=55000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=70007100720073007400750076007700}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=780079007a007b007c007d007e007f00}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=80008100820083008400850086008700}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=880089008a008b008c008d008e008f00}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=90009100920093009400950096009700}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=980099009a009b009c009d009e009f00}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=a000a100a200a300a400a500a600a700}
  0x0001400 (2, 1, 1)