|
DataMuseum.dkPresents historical artifacts from the history of: CP/M |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about CP/M Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metricsIndex: 0 5 B C D E H I L M N P R S T
Length: 1261568 (0x134000) Description: Bits:30002786 SW1500 Concurrent DOS SYSTEM DISKETTE 4.2 - disk 3/3 Types: 5¼" Floppy Disk, CpmFSAuto Notes: CpmFSAuto_1024_2048_0x0_512_*3+1+2+3_2:0_76:1
Media: [0, 0, 1] … [76, 1, 8] {1024: 1232} Signature: CpmFSAuto_1024_2048_0x0_512_*3+1+2+3_2:0_76:1 Confidence score: +43/-1 Sector size: 1024 Block size: 2048 Directory entries: 512 Block number size: 16 Extent-mask: 0x00 Sector-interleave: 1, 4, 7, 2, 5, 8, 3, 6 Tracks: (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user | bc | length | name | artifact |
---|---|---|---|---|
0 | 0 | 10240 | BATCH.CMD | ⟦23237b5f9⟧ |
0 | 0 | 2432 | CHDIR.CMD | ⟦da605220b⟧ |
0 | 0 | 21760 | CHSET.CMD | ⟦623a768bf⟧ |
0 | 0 | 28672 | COPY.EXE | ⟦28cefd730⟧ |
0 | 0 | 2560 | DATE.EXE | ⟦8ce8ba8e7⟧ 0x00[0xa00] |
0 | 0 | 2432 | ERA.CMD | ⟦6cfee0e79⟧ |
0 | 0 | 3968 | ERAQ.CMD | ⟦b1ccc1eec⟧ |
0 | 0 | 1536 | ERASE.EXE | ⟦f5c6856a0⟧ |
0 | 0 | 7680 | HELP.CMD | ⟦f216a2d39⟧ |
0 | 0 | 41984 | HELP.HLP | ⟦45e9ed6ec⟧ |
0 | 0 | 36992 | INITDIR.CMD | ⟦b576c80df⟧ |
0 | 0 | 11392 | LOCAL.CMD | ⟦67740e81a⟧ |
0 | 0 | 16384 | LOGOFF.CMD | ⟦86a38da60⟧ |
0 | 0 | 18304 | LOGON.CMD | ⟦e155155cc⟧ |
0 | 0 | 2304 | MKDIR.CMD | ⟦9a33f497d⟧ |
0 | 0 | 15872 | NAMES.CMD | ⟦7b551fbfb⟧ |
0 | 0 | 22784 | NAMESMOD.CMD | ⟦ac2a57ea3⟧ |
0 | 0 | 17536 | NET.CMD | ⟦ab26296bf⟧ |
0 | 0 | 16256 | NETOFF.CMD | ⟦11520bf2e⟧ |
0 | 0 | 16384 | NETON.CMD | ⟦166f6d125⟧ |
0 | 0 | 17920 | NETSTAT.CMD | ⟦754b4c316⟧ |
0 | 0 | 2560 | PATH.EXE | ⟦af696122a⟧ |
0 | 0 | 9344 | PIP.CMD | ⟦d14331717⟧ |
0 | 0 | 2048 | REN.EXE | ⟦89e617d0f⟧ |
0 | 0 | 2176 | RMDIR.CMD | ⟦81ba98739⟧ |
0 | 0 | 13312 | SDIR.CMD | ⟦3d6b13af1⟧ |
0 | 0 | 7680 | SET.CMD | ⟦2eec9f63b⟧ |
0 | 0 | 7424 | SHOW.CMD | ⟦b333c5394⟧ |
0 | 0 | 7168 | STOP.CMD | ⟦0ec4d3ea6⟧ |
0 | 0 | 2304 | SYSDISK.CMD | ⟦5012bb94a⟧ |
0 | 0 | 2048 | TIME.EXE | ⟦cb3e8355b⟧ |
0 | 0 | 2048 | TYPE.CMD | ⟦f54c3af4b⟧ |
Geometry: [[0, 0, 1], [76, 1, 8]] First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records Credible directory tracks: (2, 0) 0x8000 26-21-2-2-2-2-2-2 (2, 1) 0xa000 2-2-2-2-2-2-2-2 Total credibility: 59 Block number width: ok16 8 0 8 202 153 False 16 0 8 202 0 False Block Sizes: 2048 0x00 +42 -0 4096 0x01 +4 -38 8192 0x03 +4 -38 16384 0x07 +4 -38 32768 0x0f +4 -38 65536 0x1f +4 -38 128 0x00 +0 -42 256 0x00 +0 -42 512 0x00 +0 -42 1024 0x00 +0 -42 Candidate interleaves in order of directory credibility: Penalty Name Order Resulting dir order 0 normal-1 (1-2-3-4-5-6-7-8) [25, 20, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +42/-0 19 normal-2 (1-3-5-7-2-4-6-8) [25, 1, 1, 1, 20, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +42/-0 19 normal-3 (1-4-7-2-5-8-3-6) [25, 1, 1, 20, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +43/-1 From the beastiarium: CpmFSCr16 +0/-0 File & label names found: 0x0008000 (2, 0, 1) ProbeDirEnt {status=0x20, name=» «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000360c0945360c0945} ProbeDirEnt {status=0x00, name=»HELP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=080009000a000b000000000000000000} ProbeDirEnt {status=0x00, name=»HELP HLP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0c000d000e000f001000110012001300} ProbeDirEnt {status=0x00, name=»HELP HLP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=1400150016001700180019001a001b00} ProbeDirEnt {status=0x00, name=»HELP HLP«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=1c001d001e001f002000000000000000} ProbeDirEnt {status=0x00, name=»SET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=21002200230024000000000000000000} ProbeDirEnt {status=0x00, name=»STOP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x38, al=25002600270028000000000000000000} ProbeDirEnt {status=0x00, name=»ERAQ CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x1f, al=29002a00000000000000000000000000} ProbeDirEnt {status=0x00, name=»ERA CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x13, al=2b002c00000000000000000000000000} ProbeDirEnt {status=0x00, name=»SDIR CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x68, al=2d002e002f0030003100320033000000} ProbeDirEnt {status=0x00, name=»SHOW CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=34003500360037000000000000000000} ProbeDirEnt {status=0x00, name=»PATH EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x14, al=38003900000000000000000000000000} ProbeDirEnt {status=0x00, name=»BATCH CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x50, al=3a003b003c003d003e00000000000000} ProbeDirEnt {status=0x00, name=»CHDIR CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x13, al=3f004000000000000000000000000000} ProbeDirEnt {status=0x00, name=»COPY EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=41004200430044004500460047004800} ProbeDirEnt {status=0x00, name=»COPY EXE«, xl=0x01, bc=0x00, xh=0x00, rc=0x60, al=49004a004b004c004d004e0000000000} ProbeDirEnt {status=0x00, name=»DATE EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x14, al=4f005000000000000000000000000000} ProbeDirEnt {status=0x00, name=»ERASE EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x0c, al=51000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»MKDIR CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x12, al=52005300000000000000000000000000} ProbeDirEnt {status=0x00, name=»PIP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x49, al=54005500560057005800000000000000} ProbeDirEnt {status=0x00, name=»RMDIR CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x11, al=59005a00000000000000000000000000} ProbeDirEnt {status=0x00, name=»REN EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=5b000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»SYSDISK CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x12, al=5c005d00000000000000000000000000} ProbeDirEnt {status=0x00, name=»TIME EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=5e000000000000000000000000000000} 0x0008400 (2, 0, 2) ProbeDirEnt {status=0x00, name=»TYPE CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=5f000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»CHSET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700} ProbeDirEnt {status=0x00, name=»CHSET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x2a, al=680069006a0000000000000000000000} ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=6b006c006d006e006f00700071007200} ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=73007400750076007700780079007a00} ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x21, al=7b007c007d0000000000000000000000} ProbeDirEnt {status=0x00, name=»NETON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7e007f00800081008200830084008500} ProbeDirEnt {status=0x00, name=»NETOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7f, al=86008700880089008a008b008c008d00} ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8e008f00900091009200930094009500} ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0f, al=96000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9700980099009a009b009c009d009e00} ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9f00a000a100a200a300a400a500a600} ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=a7000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»LOCAL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=a800a900aa00ab00ac00ad0000000000} ProbeDirEnt {status=0x00, name=»NAMES CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7c, al=ae00af00b000b100b200b300b400b500} ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b600b700b800b900ba00bb00bc00bd00} ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x32, al=be00bf00c000c1000000000000000000} ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c200c300c400c500c600c700c800c900} ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=ca000000000000000000000000000000} 0x0008800 (2, 0, 3) 0x0008c00 (2, 0, 4) 0x0009000 (2, 0, 5) 0x0009400 (2, 0, 6) 0x0009800 (2, 0, 7) 0x0009c00 (2, 0, 8) 0x000a000 (2, 1, 1) 0x000a400 (2, 1, 2) 0x000a800 (2, 1, 3) 0x000ac00 (2, 1, 4) 0x000b000 (2, 1, 5) 0x000b400 (2, 1, 6) 0x000b800 (2, 1, 7) 0x000bc00 (2, 1, 8) + 43 - 1 <Tree 0x0-0x9a000-0x134000> + 42 - 0 <Tree 0x0-0x9a000-0x134000>