DataMuseum.dk

Presents historical artifacts from the history of:

CP/M

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CP/M

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics
Index: 5 B C G I L M N P R S T X

⟦0b1fb4f55⟧ Bits:30003935/disk2.imd SW1500-F Concurrent DOS 5.2 system disketter, 5¼" Floppy Disk, CpmFSAuto, ImdContainer

    Length: 1261568 (0x134000)
    Description: Bits:30003935/disk2.imd SW1500-F Concurrent DOS 5.2 system disketter
    Types: 5¼" Floppy Disk, CpmFSAuto, ImdContainer
    Notes: CP/M-fs(1024_2048_0x0_*1+1_2:0_76:1_128)

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         1024_2048_0x0_*1+1_2:0_76:1_128
Confidence score:  +118/-0 
Sector size:       1024
Block size:        2048
Directory entries: 128
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0 0 24064 BDOS.CON ⟦c4ff8b044⟧
0 0 284416 CCPM.SYS ⟦1d7dded21⟧
0 0 7936 CIO.CON ⟦0468d798f⟧
0 0 640 CLOCK.RSP ⟦653113b20⟧
0 0 59776 GENSYS.CMD ⟦f6ac31891⟧
0 0 1024 GENSYS.CNF ⟦9f9cf777d⟧
0 0 28544 IMC.CMD ⟦a884eed7c⟧
0 0 9856 IMCSTART.CMD ⟦b3c4e46a5⟧
0 0 9856 IMCSTOP.CMD ⟦b3c4e46a5⟧
0 0 38784 LANREL.CMD ⟦37df72607⟧
0 0 24320 LIST.CMD ⟦f6ed1283e⟧
0 0 39680 MATREL.CMD ⟦2b271eb7e⟧
0 0 18560 MATRELHW.CMD ⟦d005f777e⟧
0 0 19712 MATRELSW.CMD ⟦653eb29cf⟧
0 0 6912 MEM.CON ⟦d32982086⟧
0 0 34688 NETDRV.RSP ⟦160358293⟧
0 0 1024 NETSYS.CNF ⟦69609b559⟧
0 0 3072 PIN750.RSP ⟦1c720f098⟧
0 0 4864 RCDSP.CMD ⟦d323dfd11⟧
0 0 58880 RCGENDOS.CMD ⟦7888590e9⟧
0 0 45824 RCGENNET.CMD ⟦a52842925⟧
0 0 1920 RCNIOS.CMD ⟦9ca52216a⟧
0 0 16896 RCSPL.CMD ⟦927c17f7e⟧
0 0 7424 REDIR.RSP ⟦d6ad97c71⟧
0 0 3200 REMOTE.CMD ⟦0be48bc52⟧
0 0 36224 REMTMP.RSP ⟦9b8acec77⟧
0 0 29056 RNET.CMD ⟦1c8e4c753⟧
0 0 35456 RSNET.CMD ⟦47dbeb2ce⟧
0 0 7808 RTM.CON ⟦fa0f13387⟧
0 0 6272 SCROLL.RSP ⟦20fc125da⟧
0 0 39680 SIOREL.CMD ⟦b67a9a5d0⟧
0 0 18560 SNET.CMD ⟦cb3e0e7f3⟧
0 0 38272 SPOOL.CMD ⟦ada33fef6⟧
0 0 39808 STRREL.CMD ⟦a58d65608⟧
0 0 9216 SUP.CON ⟦fb28f1cc1⟧
0 0 3328 SYSDAT.CON ⟦21e1d5617⟧
0 0 50560 SYSVEDL.CMD ⟦669c0e177⟧
0 0 36736 TMP750.RSP ⟦12a6240a9⟧
0 0 41600 XIOS.CON ⟦3c17f80ee⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 8]]

First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x8000 25-25-25-25-1-1-1-1
   (2, 1)  0xa000 1-1-1-1-1-1-1-1

Total credibility: 96

Block number width: ok16

   8   421     1   255   215  False
  16     0     8   583     0  False

Block Sizes:
    2048 0x00 +95 -0
    1024 0x00 +4 -91
    4096 0x01 +4 -91
    8192 0x03 +4 -91
   16384 0x07 +4 -91
   32768 0x0f +4 -91
   65536 0x1f +4 -91
     512 0x00 +1 -94
     128 0x00 +0 -95
     256 0x00 +0 -95

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5-6-7-8)                                                         [24, 24, 24, 24]   +118/-0
     26  normal-2     (1-3-5-7-2-4-6-8)                                                         [24, 24, 0, 0, 24, 24]   +107/-13
     51  normal-3     (1-4-7-2-5-8-3-6)                                                         [24, 24, 0, 24, 0, 0, 24]   +111/-14
From the beastiarium: CpmFSCr16   +0/-0

File & label names found:
  0x0008000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»SW1500 2-3 «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000cd0e1035cd0e1035}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=50005100520053005400550056005700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0a, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0b, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0c, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0d, bc=0x00, xh=0x00, rc=0x80, al=70007100720073007400750076007700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0e, bc=0x00, xh=0x00, rc=0x80, al=780079007a007b007c007d007e007f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0f, bc=0x00, xh=0x00, rc=0x80, al=80008100820083008400850086008700}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x10, bc=0x00, xh=0x00, rc=0x80, al=880089008a008b008c008d008e008f00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x11, bc=0x00, xh=0x00, rc=0x2e, al=90009100920000000000000000000000}
    ProbeDirEnt {status=0x00, name=»GENSYS  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=93009400950096009700980099009a00}
    ProbeDirEnt {status=0x00, name=»GENSYS  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=9b009c009d009e009f00a000a100a200}
    ProbeDirEnt {status=0x00, name=»GENSYS  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=a300a400a500a600a700a800a900aa00}
    ProbeDirEnt {status=0x00, name=»GENSYS  CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x53, al=ab00ac00ad00ae00af00b00000000000}
    ProbeDirEnt {status=0x00, name=»GENSYS  CNF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=b1000000000000000000000000000000}
  0x0008400 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»NETSYS  CNF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=b2000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b300b400b500b600b700b800b900ba00}
    ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=bb00bc00bd00be00bf00c000c100c200}
    ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=c300c400c500c600c700c800c900ca00}
    ProbeDirEnt {status=0x00, name=»RCGENDOSCMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x4c, al=cb00cc00cd00ce00cf00000000000000}
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d000d100d200d300d400d500d600d700}
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d800d900da00db00dc00dd00de00df00}
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x66, al=e000e100e200e300e400e500e6000000}
    ProbeDirEnt {status=0x00, name=»RCNIOS  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=e7000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e800e900ea00eb00ec00ed00ee00ef00}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=f000f100000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f200f300f400f500f600f700f800f900}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=fa00fb00fc00fd00fe00ff0000010101}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x15, al=02010301000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0401050106010701080109010a010b01}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x63, al=0c010d010e010f011001110112010000}
    ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=13011401150116011701180119011a01}
    ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x3c, al=1b011c011d011e010000000000000000}
    ProbeDirEnt {status=0x00, name=»CIO     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3e, al=1f012001210122010000000000000000}
    ProbeDirEnt {status=0x00, name=»MEM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x36, al=23012401250126010000000000000000}
    ProbeDirEnt {status=0x00, name=»RTM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3d, al=2701280129012a010000000000000000}
    ProbeDirEnt {status=0x00, name=»SUP     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x48, al=2b012c012d012e012f01000000000000}
    ProbeDirEnt {status=0x00, name=»SYSDAT  CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=30013101000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=32013301340135013601370138013901}
  0x0008800 (2, 0, 3)
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=3a013b013c013d013e013f0140014101}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x45, al=42014301440145014601000000000000}
    ProbeDirEnt {status=0x00, name=»CLOCK   RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=47010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=480149014a014b014c014d014e014f01}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=50015101520153015401550156015701}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x0f, al=58010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PIN750  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=59015a01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TMP750  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5b015c015d015e015f01600161016201}
    ProbeDirEnt {status=0x00, name=»TMP750  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=63016401650166016701680169016a01}
    ProbeDirEnt {status=0x00, name=»TMP750  RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x1f, al=6b016c01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»REDIR   RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=6d016e016f0170010000000000000000}
    ProbeDirEnt {status=0x00, name=»SCROLL  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x31, al=71017201730174010000000000000000}
    ProbeDirEnt {status=0x00, name=»REMTMP  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=750176017701780179017a017b017c01}
    ProbeDirEnt {status=0x00, name=»REMTMP  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=7d017e017f0180018101820183018401}
    ProbeDirEnt {status=0x00, name=»REMTMP  RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x1b, al=85018601000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»REMOTE  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=87018801000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=89018a018b018c018d018e018f019001}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=91019201930194019501960197019801}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2b, al=99019a019b0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCSPL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9c019d019e019f01a001a101a201a301}
    ProbeDirEnt {status=0x00, name=»RCSPL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x04, al=a4010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCDSP   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x26, al=a501a601a70100000000000000000000}
    ProbeDirEnt {status=0x00, name=»LIST    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a801a901aa01ab01ac01ad01ae01af01}
    ProbeDirEnt {status=0x00, name=»LIST    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x3e, al=b001b101b201b3010000000000000000}
  0x0008c00 (2, 0, 4)
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b401b501b601b701b801b901ba01bb01}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=bc01bd01be01bf01c001c101c201c301}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=c401c501c601c701c801c901ca01cb01}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x0b, al=cc010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cd01ce01cf01d001d101d201d301d401}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d501d601d701d801d901da01db01dc01}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2f, al=dd01de01df0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e001e101e201e301e401e501e601e701}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=e801e901ea01eb01ec01ed01ee01ef01}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=f001f101f201f3010000000000000000}
    ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f401f501f601f701f801f901fa01fb01}
    ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=fc01fd01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=fe01ff01000201020202030204020502}
    ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=06020702000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080209020a020b020c020d020e020f02}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10021102120213021402150216021702}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=180219021a021b020000000000000000}
    ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1c021d021e021f022002210222022302}
    ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2402250226022702280229022a022b02}
    ProbeDirEnt {status=0x00, name=»STRREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x37, al=2c022d022e022f020000000000000000}
    ProbeDirEnt {status=0x00, name=»IMC     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=30023102320233023402350236023702}
    ProbeDirEnt {status=0x00, name=»IMC     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x5f, al=380239023a023b023c023d0200000000}
    ProbeDirEnt {status=0x00, name=»IMCSTARTCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x4d, al=3e023f02400241024202000000000000}
    ProbeDirEnt {status=0x00, name=»IMCSTOP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x4d, al=43024402450246024702000000000000}
* 118 -   0 [1, 2, 3, 4, 5, 6, 7, 8]
+ 111 -  14 [1, 4, 7, 2, 5, 8, 3, 6]
+ 107 -  13 [1, 3, 5, 7, 2, 4, 6, 8]

Full view