DataMuseum.dk

Presents historical artifacts from the history of:

Bogika Butler

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about Bogika Butler

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: 0 2 5 A B C D E F G H I J K L M N O P R S T U V W

⟦909f4eb2b⟧ Bits:30009789/_.ft.Ibm2.50006622.imd Mogens Pelles Zilog 80,000 / EOS projekt, 5¼" Floppy Disk, CpmFSButler1a, ImdContainer

    Length: 819200 (0xc8000)
    Description: Bits:30009789/_.ft.Ibm2.50006622.imd Mogens Pelles Zilog 80,000 / EOS projekt
    Types: 5¼" Floppy Disk, CpmFSButler1a, ImdContainer
    Notes: CP/M-fs(512_2048_0x0_*3+1+3+2_2:0_159:1_96)

CpmFSButler1a

Media:             [0, 0, 1] … [159, 1, 10] {512: 1600}
Signature:         512_2048_0x0_*3+1+3+2_2:0_159:1_96
Confidence score:  +142/-0 
Sector size:       512
Block size:        2048
Directory entries: 96
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 4, 7, 10, 3, 6, 9, 2, 5, 8
Tracks:            (2, 0), (3, 1), (4, 0), (5, 1), (6, 0), (7, 1) […] (154, 0), (155, 1), (156, 0), (157, 1), (158, 0), (159, 1)
user bc length name artifact
00384ABORT.CF⟦02d58e89a⟧ TextFile
003712ABORT.SA⟦a20daf77f⟧ TextFile
001536ALLOC.ID⟦d0bec068c⟧ TextFile
003072ALSTS.SA⟦b3c4b8097⟧ TextFile
001152APPLI.ID⟦91700c4d0⟧ TextFile
001152APPLI.IDA⟦c1170655e⟧ TextFile
003712BOBJ.SA⟦96f7e2f59⟧ TextFile
00256CCLDCVXX.CF⟦c67b8b9ca⟧ TextFile
00128CHKEXT.CF⟦5b59ea9b4⟧ TextFile
001152CHKEXT.SA⟦0ba7ae984⟧ TextFile
001408CHKOBJ.SA⟦7ee34633e⟧ TextFile
002432CHKPROCS.SA⟦61d4d2c3b⟧ TextFile
00768CLOCK.ID⟦6e2485586⟧ TextFile
00128CLOCKEXT.CF⟦1d1e7d28e⟧ TextFile
001664CLOCKEXT.SA⟦ee2572488⟧ TextFile
00384CREATE.CF⟦b24a888b6⟧ TextFile
004864CREATE.SA⟦cfce5238c⟧ TextFile
00384DELETE.CF⟦adf46dac9⟧ TextFile
003712DELETE.SA⟦294b4a8f1⟧ TextFile
007168DIS.SA⟦4fa22049e⟧ TextFile
00128DRIVEXT.CF⟦76ed0e471⟧ TextFile
0011904DRIVEXT.SA⟦10713c1b5⟧ TextFile
008704DVJMODJ.SA⟦467157f09⟧ TextFile
001280EENT.SA⟦3055b8d2f⟧ TextFile
003200EXCEPT.SA⟦714f9a044⟧ TextFile
00384EXCLUDE.CF⟦e16d5d1da⟧ TextFile
006400EXCLUDE.SA⟦a315d112d⟧ TextFile
004096FIOEQU.SA⟦f36cf038f⟧ TextFile
003840GOTO.SA⟦998ce8cbd⟧ TextFile
002048HDREOS.SA⟦19a1b3bab⟧ TextFile
00384INCLUDE.CF⟦2c3352068⟧ TextFile
006400INCLUDE.SA⟦c11747a08⟧ TextFile
00256INIT.CF⟦5710db348⟧ TextFile
003712INIT.SA⟦5bfd3918e⟧ TextFile
00384INITWT.CF⟦58d1afca1⟧ TextFile
005632INITWT.SA⟦523654fb0⟧ TextFile
005376IOSYS.ID⟦6c665d300⟧ TextFile
00896JOBHA.ID⟦6443cf669⟧ TextFile
009344KNEL.ID⟦8686d908e⟧ TextFile
0012544LIB.SA⟦a1cad884f⟧ TextFile
00384LOAD.CF⟦12f62f82a⟧ TextFile
004736LOAD.SA⟦ff50f2bcd⟧ TextFile
008320MACEOSM.SA⟦443ac33a8⟧ TextFile
002048MIKTYPES.SA⟦d6e24ad5c⟧ TextFile
001792MOVEA.SA⟦596e475f7⟧ TextFile
002048MPA.SA⟦7ea4cebf9⟧ TextFile
003840MPF.SA⟦b94558869⟧ TextFile
002176MRK.SA⟦e7afe3c45⟧ TextFile
00128NEW.SA⟦6fca86c50⟧ 0x1a[0x80]
00384NEWEOSLD.CF⟦9ed0cf06d⟧ TextFile
0022400NEWEOSLD.SA⟦62bfa9bae⟧ TextFile
001792NSB.SA⟦ff6b535e9⟧ TextFile
003584OBCALL.SA⟦b79a9f8cb⟧ TextFile
0013568OBJDIR.ID⟦356f054a7⟧ TextFile
0035328OLDCALLS.SS⟦6e2409a05⟧ TextFile
00384OPTIINIT.CF⟦2224ce17b⟧ TextFile
003584OPTIINIT.SA⟦da4bfdb70⟧ TextFile
007424PIP.COM⟦7f9e12a92⟧
004096RLS.SA⟦2af9a12fe⟧ TextFile
005888RTEQU.SA⟦152bdbb9a⟧ TextFile
00384SCAN.CF⟦b07963fa6⟧ TextFile
004480SCAN.SA⟦fbdaa6491⟧ TextFile
001280SCHED.ID⟦0e0a951b6⟧ TextFile
00896SHCLFS.ID⟦d077dee7e⟧ TextFile
003200SSP.SA⟦22efa06f6⟧ TextFile
00768STUBLOCS.SA⟦7c80b3b7f⟧ TextFile
006144SYSCALLS.CC⟦81d07889e⟧ TextFile
0092544SYSCALLS.SS⟦aaf85b54e⟧ TextFile
0012288TERMTOOL.SA⟦4e6baba99⟧ TextFile
003200TLIB.SA⟦0a2b6b045⟧ TextFile
00384TPDEMO.CF⟦c8bff09f4⟧ TextFile
005504TPDEMO.SA⟦72c64834d⟧ TextFile
003712TRAP.SA⟦163c1324b⟧ TextFile
001408UAPPLI.ID⟦97915a527⟧ TextFile
00128UNICSEXT.CF⟦a645cf7f6⟧ TextFile
003072UNICSEXT.SA⟦19305b364⟧ TextFile
001920UNIJCS.ID⟦97a5ca4c3⟧ TextFile
0013568UNIJCST.SA⟦369bdae5b⟧ TextFile
005376UNIV.ID⟦1414e249c⟧ TextFile
006144UNIXFS.ID⟦435c69894⟧ TextFile
00384UNIXUTIL.CF⟦d4e4183fa⟧ TextFile
001920UNIXUTIL.SA⟦b215fab02⟧ TextFile
001280UNMAP.SA⟦2708a790b⟧ TextFile
00384VERSACUT.CF⟦1bd8d5b94⟧ TextFile
005632VERSACUT.SA⟦7a5b4d9d0⟧ TextFile
003072VPA.SA⟦b8e5dffdf⟧ TextFile
002560VPF.SA⟦fe4837051⟧ TextFile
001792WINDOWFS.ID⟦bb7f2acb2⟧ TextFile

CP/M filesystem probe

Geometry: [[0, 0, 1], [159, 1, 10]]

First credible dirsect is: (2, 0, 1) at 0x2800 with 0x0 attribute records

Credible directory tracks:
   (2, 0)  0x2800 17-1-17-17-0-17-17-0-13-17

Total credibility: 108

Block number width: ok16

   8    33     1   255   159  False
  16     0     2   279     0  False

Block Sizes:
    2048 0x00 +108 -0
    4096 0x01 +50 -58
    8192 0x03 +50 -58
   16384 0x07 +50 -58
   32768 0x0f +50 -58
   65536 0x1f +50 -58
    1024 0x00 +31 -77
     512 0x00 +27 -81
     256 0x00 +12 -96
     128 0x00 +6 -102

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-3     (1-4-7-10-3-6-9-2-5-8)                                                    [16, 16, 16, 16, 16, 16, 12]   +0/-0
From the beastiarium: CpmFSButler1a   +142/-0
From the beastiarium: CpmFSButler1b   +72/-38
From the beastiarium: CpmFSJames   +0/-0

File & label names found:
  0x0002800 (2, 0, 1)
    ProbeDirEnt {status=0x00, name=»PIP     COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=02000300040005000000000000000000}
    ProbeDirEnt {status=0x00, name=»UNIV    ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x2a, al=06000700080000000000000000000000}
    ProbeDirEnt {status=0x00, name=»KNEL    ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x49, al=09000a000b000c000d00000000000000}
    ProbeDirEnt {status=0x00, name=»IOSYS   ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x2a, al=0e000f00100000000000000000000000}
    ProbeDirEnt {status=0x00, name=»ALLOC   ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x0c, al=11000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SCHED   ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x0a, al=12000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CLOCK   ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x06, al=13000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»APPLI   ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=14000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»JOBHA   ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x07, al=15000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»OBJDIR  ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x6a, al=16001700180019001a001b001c000000}
    ProbeDirEnt {status=0x00, name=»UAPPLI  ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x0b, al=1d000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SHCLFS  ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x07, al=1e000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»UNIJCS  ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=1f000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»UNIXFS  ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=20002100220000000000000000000000}
    ProbeDirEnt {status=0x00, name=»WINDOWFSID «, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=23000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»APPLI   IDA«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=24000000000000000000000000000000}
  0x0002e00 (2, 0, 4)
    ProbeDirEnt {status=0x00, name=»MIKTYPESSA «, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=25000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TERMTOOLSA «, xl=0x00, bc=0x00, xh=0x00, rc=0x60, al=26002700280029002a002b0000000000}
    ProbeDirEnt {status=0x00, name=»CHKPROCSSA «, xl=0x00, bc=0x00, xh=0x00, rc=0x13, al=2c002d00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MACEOSM SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x41, al=2e002f00300031003200000000000000}
    ProbeDirEnt {status=0x00, name=»STUBLOCSSA «, xl=0x00, bc=0x00, xh=0x00, rc=0x06, al=33000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»HDREOS  SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=34000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DRIVEXT SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x5d, al=350036003700380039003a0000000000}
    ProbeDirEnt {status=0x00, name=»UNICSEXTSA «, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=3b003c00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CLOCKEXTSA «, xl=0x00, bc=0x00, xh=0x00, rc=0x0d, al=3d000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CHKEXT  SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=3e000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CHKEXT  CF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=3f000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CLOCKEXTCF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=40000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DRIVEXT CF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=41000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»UNICSEXTCF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=42000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»FIOEQU  SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x20, al=43004400000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RTEQU   SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x2e, al=45004600470000000000000000000000}
  0x0003400 (2, 0, 7)
    ProbeDirEnt {status=0x00, name=»BOBJ    SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x1d, al=48004900000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»EENT    SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x0a, al=4a000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»VPF     SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x14, al=4b004c00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SSP     SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=4d004e00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MOVEA   SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=4f000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»OBCALL  SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x1c, al=50005100000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NSB     SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=52000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MPF     SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x1e, al=53005400000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MPA     SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=55000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»UNMAP   SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x0a, al=56000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»EXCEPT  SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=57005800000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»GOTO    SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x1e, al=59005a00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TRAP    SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x1d, al=5b005c00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»VPA     SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=5d005e00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CHKOBJ  SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x0b, al=5f000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»ALSTS   SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=60006100000000000000000000000000}
  0x0003a00 (2, 0, 10)
    ProbeDirEnt {status=0x00, name=»DIS     SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x38, al=62006300640065000000000000000000}
    ProbeDirEnt {status=0x00, name=»MRK     SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x11, al=66006700000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NEW     SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=68000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RLS     SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x20, al=69006a00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DVJMODJ SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x44, al=6b006c006d006e006f00000000000000}
    ProbeDirEnt {status=0x00, name=»LIB     SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=70007100720073007400750076000000}
    ProbeDirEnt {status=0x00, name=»TLIB    SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=77007800000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CCLDCVXXCF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=79000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SYSCALLSSS «, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7a007b007c007d007e007f0080008100}
    ProbeDirEnt {status=0x00, name=»SYSCALLSSS «, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=82008300840085008600870088008900}
    ProbeDirEnt {status=0x00, name=»SYSCALLSSS «, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=8a008b008c008d008e008f0090009100}
    ProbeDirEnt {status=0x00, name=»SYSCALLSSS «, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=92009300940095009600970098009900}
    ProbeDirEnt {status=0x00, name=»SYSCALLSSS «, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=9a009b009c009d009e009f00a000a100}
    ProbeDirEnt {status=0x00, name=»SYSCALLSSS «, xl=0x05, bc=0x00, xh=0x00, rc=0x53, al=a200a300a400a500a600a70000000000}
    ProbeDirEnt {status=0x00, name=»SYSCALLSCC «, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=a800a900aa0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»OLDCALLSSS «, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ab00ac00ad00ae00af00b000b100b200}
  0x0002c00 (2, 0, 3)
    ProbeDirEnt {status=0x00, name=»OLDCALLSSS «, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=b300b400b500b600b700b800b900ba00}
    ProbeDirEnt {status=0x00, name=»OLDCALLSSS «, xl=0x02, bc=0x00, xh=0x00, rc=0x14, al=bb00bc00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»ABORT   SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x1d, al=bd00be00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TPDEMO  SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=bf00c000c10000000000000000000000}
    ProbeDirEnt {status=0x00, name=»VERSACUTSA «, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=c200c300c40000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NEWEOSLDSA «, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c500c600c700c800c900ca00cb00cc00}
    ProbeDirEnt {status=0x00, name=»NEWEOSLDSA «, xl=0x01, bc=0x00, xh=0x00, rc=0x2f, al=cd00ce00cf0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»INCLUDE SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x32, al=d000d100d200d3000000000000000000}
    ProbeDirEnt {status=0x00, name=»EXCLUDE SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x32, al=d400d500d600d7000000000000000000}
    ProbeDirEnt {status=0x00, name=»SCAN    SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x23, al=d800d900da0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CREATE  SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x26, al=db00dc00dd0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»LOAD    SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x25, al=de00df00e00000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DELETE  SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x1d, al=e100e200000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»INITWT  SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=e300e400e50000000000000000000000}
    ProbeDirEnt {status=0x00, name=»UNIXUTILSA «, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=e6000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»OPTIINITSA «, xl=0x00, bc=0x00, xh=0x00, rc=0x1c, al=e700e800000000000000000000000000}
  0x0003200 (2, 0, 6)
    ProbeDirEnt {status=0x00, name=»INIT    SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x1d, al=e900ea00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»UNIJCST SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x6a, al=eb00ec00ed00ee00ef00f000f1000000}
    ProbeDirEnt {status=0x00, name=»ABORT   CF «, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=f2000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»VERSACUTCF «, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=f3000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NEWEOSLDCF «, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=f4000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»INCLUDE CF «, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=f5000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»EXCLUDE CF «, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=f6000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SCAN    CF «, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=f7000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CREATE  CF «, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=f8000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»LOAD    CF «, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=f9000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DELETE  CF «, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=fa000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»INITWT  CF «, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=fb000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»OPTIINITCF «, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=fc000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»INIT    CF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=fd000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TPDEMO  CF «, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=fe000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»UNIXUTILCF «, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=ff000000000000000000000000000000}
  0x0003800 (2, 0, 9)
    ProbeDirEnt {status=0x00, name=»UNIJCST CF «, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=00010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TXTCONV SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x16, al=01010201000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»EOSLINK SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x3d, al=03010401050106010000000000000000}
    ProbeDirEnt {status=0x00, name=»EOSLOAD SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x6c, al=0701080109010a010b010c010d010000}
    ProbeDirEnt {status=0x00, name=»BOOTGEN SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=0e010f01100100000000000000000000}
    ProbeDirEnt {status=0x00, name=»CREAFILESA «, xl=0x00, bc=0x00, xh=0x00, rc=0x0a, al=11010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CREAFILECF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=12010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»EOSLOAD CF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=13010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TXTCONV CF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=14010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»EOSUNIX CF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=15010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»EOSJCL  CF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=16010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»UXFSTESTCF «, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=17010000000000000000000000000000}
* 142 -   0 [1, 4, 7, 10, 3, 6, 9, 2, 5, 8]
+  72 -  38 [1, 4, 7, 10, 2, 5, 8, 3, 6, 9]

Full view