DataMuseum.dk

Presents historical artifacts from the history of:

Bogika Butler

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about Bogika Butler

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: 0 2 5 A B C D E F G H I J K L M N O R S T U V W

⟦ddcd65152⟧ Bits:30009789/_.ft.Ibm2.50006617.imd Mogens Pelles Zilog 80,000 / EOS projekt, 5¼" Floppy Disk, CpmFSButler1a, ImdContainer

    Length: 819200 (0xc8000)
    Description: Bits:30009789/_.ft.Ibm2.50006617.imd Mogens Pelles Zilog 80,000 / EOS projekt
    Types: 5¼" Floppy Disk, CpmFSButler1a, ImdContainer
    Notes: CP/M-fs(512_2048_0x0_*3+1+3+2_2:0_159:1_96)

CpmFSButler1a

Media:             [0, 0, 1] … [159, 1, 10] {512: 1600}
Signature:         512_2048_0x0_*3+1+3+2_2:0_159:1_96
Confidence score:  +96/-0 
Sector size:       512
Block size:        2048
Directory entries: 96
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 4, 7, 10, 3, 6, 9, 2, 5, 8
Tracks:            (2, 0), (3, 1), (4, 0), (5, 1), (6, 0), (7, 1) […] (154, 0), (155, 1), (156, 0), (157, 1), (158, 0), (159, 1)
user bc length name artifact
0 0 1536 ALLOC.ID ⟦d0bec068c⟧ TextFile
0 0 3072 ALSTS.SA ⟦b3c4b8097⟧ TextFile
0 0 1152 APPLI.ID ⟦91700c4d0⟧ TextFile
0 0 1152 APPLI.IDA ⟦c1170655e⟧ TextFile
0 0 3712 BOBJ.SA ⟦96f7e2f59⟧ TextFile
0 0 256 CCLDCVXX.CF ⟦c67b8b9ca⟧ TextFile
0 0 128 CHKEXT.CF ⟦5b59ea9b4⟧ TextFile
0 0 1152 CHKEXT.SA ⟦0ba7ae984⟧ TextFile
0 0 1408 CHKOBJ.SA ⟦7ee34633e⟧ TextFile
0 0 2432 CHKPROCS.SA ⟦61d4d2c3b⟧ TextFile
0 0 768 CLOCK.ID ⟦6e2485586⟧ TextFile
0 0 128 CLOCKEXT.CF ⟦1d1e7d28e⟧ TextFile
0 0 1664 CLOCKEXT.SA ⟦ee2572488⟧ TextFile
0 0 7168 DIS.SA ⟦4fa22049e⟧ TextFile
0 0 128 DRIVEXT.CF ⟦76ed0e471⟧ TextFile
0 0 11904 DRIVEXT.SA ⟦10713c1b5⟧ TextFile
0 0 8704 DVJMODJ.SA ⟦467157f09⟧ TextFile
0 0 1280 EENT.SA ⟦3055b8d2f⟧ TextFile
0 0 3200 EXCEPT.SA ⟦714f9a044⟧ TextFile
0 0 4096 FIOEQU.SA ⟦f36cf038f⟧ TextFile
0 0 3840 GOTO.SA ⟦998ce8cbd⟧ TextFile
0 0 2048 HDREOS.SA ⟦19a1b3bab⟧ TextFile
0 0 5376 IOSYS.ID ⟦6c665d300⟧ TextFile
0 0 896 JOBHA.ID ⟦6443cf669⟧ TextFile
0 0 9344 KNEL.ID ⟦8686d908e⟧ TextFile
0 0 12544 LIB.SA ⟦a1cad884f⟧ TextFile
0 0 8320 MACEOSM.SA ⟦443ac33a8⟧ TextFile
0 0 2048 MIKTYPES.SA ⟦d6e24ad5c⟧ TextFile
0 0 1792 MOVEA.SA ⟦596e475f7⟧ TextFile
0 0 2048 MPA.SA ⟦7ea4cebf9⟧ TextFile
0 0 3840 MPF.SA ⟦b94558869⟧ TextFile
0 0 2176 MRK.SA ⟦e7afe3c45⟧ TextFile
0 0 128 NEW.SA ⟦6fca86c50⟧ 0x1a[0x80]
0 0 1792 NSB.SA ⟦ff6b535e9⟧ TextFile
0 0 3584 OBCALL.SA ⟦b79a9f8cb⟧ TextFile
0 0 13568 OBJDIR.ID ⟦356f054a7⟧ TextFile
0 0 35328 OLDCALLS.SS ⟦6e2409a05⟧ TextFile
0 0 4096 RLS.SA ⟦2af9a12fe⟧ TextFile
0 0 5888 RTEQU.SA ⟦152bdbb9a⟧ TextFile
0 0 1280 SCHED.ID ⟦0e0a951b6⟧ TextFile
0 0 896 SHCLFS.ID ⟦d077dee7e⟧ TextFile
0 0 3200 SSP.SA ⟦22efa06f6⟧ TextFile
0 0 768 STUBLOCS.SA ⟦7c80b3b7f⟧ TextFile
0 0 6144 SYSCALLS.CC ⟦81d07889e⟧ TextFile
0 0 92544 SYSCALLS.SS ⟦aaf85b54e⟧ TextFile
0 0 12288 TERMTOOL.SA ⟦4e6baba99⟧ TextFile
0 0 3200 TLIB.SA ⟦0a2b6b045⟧ TextFile
0 0 3712 TRAP.SA ⟦163c1324b⟧ TextFile
0 0 1408 UAPPLI.ID ⟦97915a527⟧ TextFile
0 0 128 UNICSEXT.CF ⟦a645cf7f6⟧ TextFile
0 0 3072 UNICSEXT.SA ⟦19305b364⟧ TextFile
0 0 1920 UNIJCS.ID ⟦97a5ca4c3⟧ TextFile
0 0 5376 UNIV.ID ⟦1414e249c⟧ TextFile
0 0 6144 UNIXFS.ID ⟦435c69894⟧ TextFile
0 0 1280 UNMAP.SA ⟦2708a790b⟧ TextFile
0 0 3072 VPA.SA ⟦b8e5dffdf⟧ TextFile
0 0 2560 VPF.SA ⟦fe4837051⟧ TextFile
0 0 1792 WINDOWFS.ID ⟦bb7f2acb2⟧ TextFile

CP/M filesystem probe

Geometry: [[0, 0, 1], [159, 1, 10]]

First credible dirsect is: (2, 0, 1) at 0x2800 with 0x0 attribute records

Credible directory tracks:
   (2, 0)  0x2800 17-1-2-17-0-1-17-0-1-17

Total credibility: 65

Block number width: ok16

   8     0     2   183   118  False
  16     0     2   184     0  False

Block Sizes:
    2048 0x00 +65 -0
    4096 0x01 +27 -38
    8192 0x03 +27 -38
   16384 0x07 +27 -38
   32768 0x0f +27 -38
   65536 0x1f +27 -38
    1024 0x00 +10 -55
     256 0x00 +6 -59
     512 0x00 +6 -59
     128 0x00 +5 -60

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-3     (1-4-7-10-3-6-9-2-5-8)                                                    [16, 16, 16, 16, 1]   +0/-0
From the beastiarium: CpmFSButler1a   +96/-0
From the beastiarium: CpmFSButler1b   +75/-30

File & label names found:
  0x0002800 (2, 0, 1)
    ProbeDirEnt {status=0x00, name=»UNIV    ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x2a, al=02000300040000000000000000000000}
    ProbeDirEnt {status=0x00, name=»KNEL    ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x49, al=05000600070008000900000000000000}
    ProbeDirEnt {status=0x00, name=»IOSYS   ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x2a, al=0a000b000c0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»ALLOC   ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x0c, al=0d000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SCHED   ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x0a, al=0e000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CLOCK   ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x06, al=0f000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»APPLI   ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=10000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»JOBHA   ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x07, al=11000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»OBJDIR  ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x6a, al=12001300140015001600170018000000}
    ProbeDirEnt {status=0x00, name=»UAPPLI  ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x0b, al=19000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SHCLFS  ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x07, al=1a000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»UNIJCS  ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=1b000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»UNIXFS  ID «, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=1c001d001e0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»WINDOWFSID «, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=1f000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»APPLI   IDA«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=20000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MIKTYPESSA «, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=21000000000000000000000000000000}
  0x0002e00 (2, 0, 4)
    ProbeDirEnt {status=0x00, name=»TERMTOOLSA «, xl=0x00, bc=0x00, xh=0x00, rc=0x60, al=22002300240025002600270000000000}
    ProbeDirEnt {status=0x00, name=»CHKPROCSSA «, xl=0x00, bc=0x00, xh=0x00, rc=0x13, al=28002900000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MACEOSM SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x41, al=2a002b002c002d002e00000000000000}
    ProbeDirEnt {status=0x00, name=»STUBLOCSSA «, xl=0x00, bc=0x00, xh=0x00, rc=0x06, al=2f000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»HDREOS  SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=30000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DRIVEXT SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x5d, al=31003200330034003500360000000000}
    ProbeDirEnt {status=0x00, name=»UNICSEXTSA «, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=37003800000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CLOCKEXTSA «, xl=0x00, bc=0x00, xh=0x00, rc=0x0d, al=39000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CHKEXT  SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=3a000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CHKEXT  CF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=3b000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CLOCKEXTCF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=3c000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DRIVEXT CF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=3d000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»UNICSEXTCF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=3e000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»FIOEQU  SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x20, al=3f004000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RTEQU   SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x2e, al=41004200430000000000000000000000}
    ProbeDirEnt {status=0x00, name=»BOBJ    SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x1d, al=44004500000000000000000000000000}
  0x0003400 (2, 0, 7)
    ProbeDirEnt {status=0x00, name=»EENT    SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x0a, al=46000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»VPF     SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x14, al=47004800000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SSP     SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=49004a00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MOVEA   SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=4b000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»OBCALL  SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x1c, al=4c004d00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NSB     SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=4e000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MPF     SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x1e, al=4f005000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MPA     SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=51000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»UNMAP   SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x0a, al=52000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»EXCEPT  SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=53005400000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»GOTO    SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x1e, al=55005600000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TRAP    SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x1d, al=57005800000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»VPA     SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=59005a00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CHKOBJ  SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x0b, al=5b000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»ALSTS   SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=5c005d00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DIS     SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x38, al=5e005f00600061000000000000000000}
  0x0003a00 (2, 0, 10)
    ProbeDirEnt {status=0x00, name=»MRK     SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x11, al=62006300000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NEW     SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=64000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RLS     SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x20, al=65006600000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DVJMODJ SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x44, al=6700680069006a006b00000000000000}
    ProbeDirEnt {status=0x00, name=»LIB     SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=6c006d006e006f007000710072000000}
    ProbeDirEnt {status=0x00, name=»TLIB    SA «, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=73007400000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CCLDCVXXCF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=75000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SYSCALLSSS «, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=76007700780079007a007b007c007d00}
    ProbeDirEnt {status=0x00, name=»SYSCALLSSS «, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=7e007f00800081008200830084008500}
    ProbeDirEnt {status=0x00, name=»SYSCALLSSS «, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=86008700880089008a008b008c008d00}
    ProbeDirEnt {status=0x00, name=»SYSCALLSSS «, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=8e008f00900091009200930094009500}
    ProbeDirEnt {status=0x00, name=»SYSCALLSSS «, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=96009700980099009a009b009c009d00}
    ProbeDirEnt {status=0x00, name=»SYSCALLSSS «, xl=0x05, bc=0x00, xh=0x00, rc=0x53, al=9e009f00a000a100a200a30000000000}
    ProbeDirEnt {status=0x00, name=»SYSCALLSCC «, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=a400a500a60000000000000000000000}
    ProbeDirEnt {status=0x00, name=»OLDCALLSSS «, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a700a800a900aa00ab00ac00ad00ae00}
    ProbeDirEnt {status=0x00, name=»OLDCALLSSS «, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=af00b000b100b200b300b400b500b600}
  0x0002c00 (2, 0, 3)
    ProbeDirEnt {status=0x00, name=»OLDCALLSSS «, xl=0x02, bc=0x00, xh=0x00, rc=0x14, al=b700b800000000000000000000000000}
*  96 -   0 [1, 4, 7, 10, 3, 6, 9, 2, 5, 8]
+  75 -  30 [1, 4, 7, 10, 2, 5, 8, 3, 6, 9]

Full view