|
DataMuseum.dkPresents historical artifacts from the history of: CP/M |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about CP/M Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metricsIndex: 5 A B C D G I L M N P R S T V X
Length: 1261568 (0x134000) Description: Bits:30007365/disk2.imd SW1500 CCP/M 86 v. 3.1 Release 2.2 Types: 5¼" Floppy Disk, CpmFSAuto, ImdContainer Notes: CpmFSAuto,1024,2048,512,0x0,1,2:0-76:1
Media: [0, 0, 1] … [76, 1, 8] {1024: 1232} Signature: CpmFSAuto,1024,2048,512,0x0,1,2:0-76:1 Confidence score: +81/-0 Sector size: 1024 Block size: 2048 Directory entries: 512 Block number size: 16 Extent-mask: 0x00 Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8 Tracks: (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user | bc | length | name | artifact |
---|---|---|---|---|
0 | 0 | 12544 | ADDNET.CMD | ⟦5b727c266⟧ |
0 | 0 | 15744 | BDOS.CON | ⟦bd8af7c56⟧ |
0 | 0 | 143744 | CCPM.SYS | ⟦fde7a1305⟧ |
0 | 0 | 5504 | CIO.CON | ⟦854488341⟧ |
0 | 0 | 640 | CLOCK.RSP | ⟦9b24ff61d⟧ |
0 | 0 | 24192 | CPADDNET.CMD | ⟦ae28f2c25⟧ |
0 | 0 | 41344 | CPGENNET.CMD | ⟦32cb584f7⟧ |
0 | 0 | 35584 | DRNET.CMD | ⟦2dc63c38e⟧ |
0 | 0 | 12800 | DSP.CMD | ⟦acf6871d9⟧ |
0 | 0 | 52608 | GENCCPM.CMD | ⟦12c309ec9⟧ |
0 | 0 | 12544 | GENNET.CMD | ⟦cb9d43b50⟧ |
0 | 0 | 11392 | LOCAL.CMD | ⟦df81e6a32⟧ |
0 | 0 | 16512 | LOGOFF.CMD | ⟦054f6893e⟧ |
0 | 0 | 18432 | LOGON.CMD | ⟦711ff7e7d⟧ |
0 | 0 | 6144 | MEM.CON | ⟦a45ffee3e⟧ |
0 | 0 | 16000 | NAMES.CMD | ⟦003bd88d2⟧ |
0 | 0 | 22912 | NAMESMOD.CMD | ⟦ea69a1aa9⟧ |
0 | 0 | 17536 | NET.CMD | ⟦4f982e6be⟧ |
0 | 0 | 17664 | NETDRV.RSP | ⟦6de4aef19⟧ |
0 | 0 | 22784 | NETDRVB.RSP | ⟦8077c95d5⟧ |
0 | 0 | 16384 | NETOFF.CMD | ⟦8243b6545⟧ |
0 | 0 | 16384 | NETON.CMD | ⟦d0b4b8648⟧ |
0 | 0 | 17920 | NETSTAT.CMD | ⟦c67d05638⟧ |
0 | 0 | 38144 | NETVEDL.CMD | ⟦48cbc5d3c⟧ |
0 | 0 | 1920 | NIOS.CMD | ⟦386443e78⟧ |
0 | 0 | 1792 | NIOS1.CMD | ⟦ea6840b62⟧ |
0 | 0 | 3328 | PIN750.RSP | ⟦5cd968efd⟧ |
0 | 0 | 1152 | R.CMD | ⟦fda426646⟧ |
0 | 0 | 128 | RDEF | ⟦1a934559b⟧ TextFile |
0 | 0 | 3072 | REMOTE.CMD | ⟦6a294b3bd⟧ |
0 | 0 | 7296 | REMTMP.RSP | ⟦42279eb5b⟧ |
0 | 0 | 27264 | RNET.CMD | ⟦48b2b85ba⟧ |
0 | 0 | 128 | RSDEF | ⟦0adbbdd18⟧ TextFile |
0 | 0 | 33408 | RSNET.CMD | ⟦0eabf50a3⟧ |
0 | 0 | 7552 | RTM.CON | ⟦54ac68e7e⟧ |
0 | 0 | 640 | SCROLL.RSP | ⟦27844af8c⟧ |
0 | 0 | 128 | SDEF | ⟦4eb454ef9⟧ TextFile |
0 | 0 | 19712 | SNET.CMD | ⟦5dce97f5c⟧ |
0 | 0 | 21120 | SPL.CMD | ⟦ffcd99468⟧ |
0 | 0 | 33664 | SPOOL.CMD | ⟦2856ddf89⟧ |
0 | 0 | 256 | STDKONF | ⟦978f529ee⟧ TextFile |
0 | 0 | 5632 | SUP.CON | ⟦8b0838509⟧ |
0 | 0 | 3328 | SYSDAT.CON | ⟦13f8b41e3⟧ |
0 | 0 | 7168 | TMP750.RSP | ⟦d1d8fec28⟧ |
0 | 0 | 2944 | VOUT.RSP | ⟦f665ed891⟧ |
0 | 0 | 33280 | XIOS.CON | ⟦a15559863⟧ |
Geometry: [[0, 0, 1], [76, 1, 8]] First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records Credible directory tracks: (2, 0) 0x8000 26-26-26-11-2-2-2-2 (2, 1) 0xa000 2-2-2-2-2-2-2-2 Total credibility: 97 Block number width: ok16 8 188 1 254 209 False 16 0 8 426 0 False 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00} 00:CCPM SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700} 00:CCPM SYS rc=0x063 c=0x007 ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x63, al=480049004a004b004c004d004e000000} 00:ADDNET CMD rc=0x062 c=0x007 ProbeDirEnt {status=0x00, name=»ADDNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=4f005000510052005300540055000000} 00:BDOS CON rc=0x07b c=0x008 ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x7b, al=56005700580059005a005b005c005d00} 00:CIO CON rc=0x02b c=0x003 ProbeDirEnt {status=0x00, name=»CIO CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=5e005f00600000000000000000000000} 00:CLOCK RSP rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»CLOCK RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=61000000000000000000000000000000} 00:CPADDNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=62006300640065006600670068006900} 00:CPADDNETCMD rc=0x03d c=0x004 ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x3d, al=6a006b006c006d000000000000000000} 00:CPGENNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=6e006f00700071007200730074007500} 00:CPGENNETCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=76007700780079007a007b007c007d00} 00:CPGENNETCMD rc=0x043 c=0x005 ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x43, al=7e007f00800081008200000000000000} 00:DRNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»DRNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=83008400850086008700880089008a00} 00:DRNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»DRNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=8b008c008d008e008f00900091009200} 00:DRNET CMD rc=0x016 c=0x002 ProbeDirEnt {status=0x00, name=»DRNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x16, al=93009400000000000000000000000000} 00:DSP CMD rc=0x064 c=0x007 ProbeDirEnt {status=0x00, name=»DSP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x64, al=950096009700980099009a009b000000} 00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9c009d009e009f00a000a100a200a300} 00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=a400a500a600a700a800a900aa00ab00} 00:GENCCPM CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=ac00ad00ae00af00b000b100b200b300} 00:GENCCPM CMD rc=0x01b c=0x002 ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x1b, al=b400b500000000000000000000000000} 00:GENNET CMD rc=0x062 c=0x007 ProbeDirEnt {status=0x00, name=»GENNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=b600b700b800b900ba00bb00bc000000} 00:LOCAL CMD rc=0x059 c=0x006 ProbeDirEnt {status=0x00, name=»LOCAL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=bd00be00bf00c000c100c20000000000} 00:LOGOFF CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c300c400c500c600c700c800c900ca00} 00:LOGOFF CMD rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x01, al=cb000000000000000000000000000000} 00:LOGON CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cc00cd00ce00cf00d000d100d200d300} 00:LOGON CMD rc=0x010 c=0x001 ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=d4000000000000000000000000000000} 00:MEM CON rc=0x030 c=0x003 ProbeDirEnt {status=0x00, name=»MEM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=d500d600d70000000000000000000000} 00:NAMES CMD rc=0x07d c=0x008 ProbeDirEnt {status=0x00, name=»NAMES CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7d, al=d800d900da00db00dc00dd00de00df00} 00:NAMESMODCMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e000e100e200e300e400e500e600e700} 00:NAMESMODCMD rc=0x033 c=0x004 ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x33, al=e800e900ea00eb000000000000000000} 00:NET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ec00ed00ee00ef00f000f100f200f300} 00:NET CMD rc=0x009 c=0x001 ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=f4000000000000000000000000000000} 00:NETDRV RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f500f600f700f800f900fa00fb00fc00} 00:NETDRV RSP rc=0x00a c=0x001 ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x0a, al=fd000000000000000000000000000000} 00:NETDRVB RSP rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=fe00ff00000101010201030104010501} 00:NETDRVB RSP rc=0x032 c=0x004 ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x32, al=06010701080109010000000000000000} 00:NETOFF CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0a010b010c010d010e010f0110011101} 00:NETON CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=12011301140115011601170118011901} 00:NETSTAT CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1a011b011c011d011e011f0120012101} 00:NETSTAT CMD rc=0x00c c=0x001 ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=22010000000000000000000000000000} 00:NETVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=23012401250126012701280129012a01} 00:NETVEDL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2b012c012d012e012f01300131013201} 00:NETVEDL CMD rc=0x02a c=0x003 ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2a, al=33013401350100000000000000000000} 00:NIOS CMD rc=0x00f c=0x001 ProbeDirEnt {status=0x00, name=»NIOS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=36010000000000000000000000000000} 00:NIOS1 CMD rc=0x00e c=0x001 ProbeDirEnt {status=0x00, name=»NIOS1 CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=37010000000000000000000000000000} 00:PIN750 RSP rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»PIN750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=38013901000000000000000000000000} 00:R CMD rc=0x009 c=0x001 ProbeDirEnt {status=0x00, name=»R CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=3a010000000000000000000000000000} 00:RDEF rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»RDEF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=3b010000000000000000000000000000} 00:REMOTE CMD rc=0x018 c=0x002 ProbeDirEnt {status=0x00, name=»REMOTE CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=3c013d01000000000000000000000000} 00:REMTMP RSP rc=0x039 c=0x004 ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x39, al=3e013f01400141010000000000000000} 00:RNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=42014301440145014601470148014901} 00:RNET CMD rc=0x055 c=0x006 ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x55, al=4a014b014c014d014e014f0100000000} 00:RSDEF rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»RSDEF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=50010000000000000000000000000000} 00:RSNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=51015201530154015501560157015801} 00:RSNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=59015a015b015c015d015e015f016001} 00:RSNET CMD rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x05, al=61010000000000000000000000000000} 00:RTM CON rc=0x03b c=0x004 ProbeDirEnt {status=0x00, name=»RTM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=62016301640165010000000000000000} 00:SCROLL RSP rc=0x005 c=0x001 ProbeDirEnt {status=0x00, name=»SCROLL RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=66010000000000000000000000000000} 00:SDEF rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»SDEF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=67010000000000000000000000000000} 00:SNET CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=680169016a016b016c016d016e016f01} 00:SNET CMD rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=70017101000000000000000000000000} 00:SPL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=72017301740175017601770178017901} 00:SPL CMD rc=0x025 c=0x003 ProbeDirEnt {status=0x00, name=»SPL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x25, al=7a017b017c0100000000000000000000} 00:SPOOL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7d017e017f0180018101820183018401} 00:SPOOL CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=850186018701880189018a018b018c01} 00:SPOOL CMD rc=0x007 c=0x001 ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x07, al=8d010000000000000000000000000000} 00:STDKONF rc=0x002 c=0x001 ProbeDirEnt {status=0x00, name=»STDKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=8e010000000000000000000000000000} 00:SUP CON rc=0x02c c=0x003 ProbeDirEnt {status=0x00, name=»SUP CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=8f019001910100000000000000000000} 00:SYSDAT CON rc=0x01a c=0x002 ProbeDirEnt {status=0x00, name=»SYSDAT CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=92019301000000000000000000000000} 00:TMP750 RSP rc=0x038 c=0x004 ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x38, al=94019501960197010000000000000000} 00:VOUT RSP rc=0x017 c=0x002 ProbeDirEnt {status=0x00, name=»VOUT RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x17, al=98019901000000000000000000000000} 00:XIOS CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9a019b019c019d019e019f01a001a101} 00:XIOS CON rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=a201a301a401a501a601a701a801a901} 00:XIOS CON rc=0x004 c=0x001 ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x04, al=aa010000000000000000000000000000} Block Size 2048.00 2048 extent_mask = 0x0 Candidate interleaves in order of directory credibility: Penalty Name Order Resulting dir order 0 normal-1 (1-2-3-4-5-6-7-8) [25, 25, 25, 10, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +81/-0 24 normal-2 (1-3-5-7-2-4-6-8) [25, 25, 1, 1, 25, 10, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +80/-10 48 normal-3 (1-4-7-2-5-8-3-6) [25, 10, 1, 25, 1, 1, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1] +80/-11 From the beastiarium: CpmFSCr16 +0/-0 File & label names found: 0x0008000 (2, 0, 1) ProbeDirEnt {status=0x20, name=»Disk 2/2 «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000030a1303030a1303} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x63, al=480049004a004b004c004d004e000000} ProbeDirEnt {status=0x00, name=»ADDNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=4f005000510052005300540055000000} ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x7b, al=56005700580059005a005b005c005d00} ProbeDirEnt {status=0x00, name=»CIO CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=5e005f00600000000000000000000000} ProbeDirEnt {status=0x00, name=»CLOCK RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=61000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=62006300640065006600670068006900} ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x3d, al=6a006b006c006d000000000000000000} ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=6e006f00700071007200730074007500} ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=76007700780079007a007b007c007d00} ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x43, al=7e007f00800081008200000000000000} ProbeDirEnt {status=0x00, name=»DRNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=83008400850086008700880089008a00} ProbeDirEnt {status=0x00, name=»DRNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=8b008c008d008e008f00900091009200} ProbeDirEnt {status=0x00, name=»DRNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x16, al=93009400000000000000000000000000} ProbeDirEnt {status=0x00, name=»DSP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x64, al=950096009700980099009a009b000000} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9c009d009e009f00a000a100a200a300} 0x0008400 (2, 0, 2) ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=a400a500a600a700a800a900aa00ab00} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=ac00ad00ae00af00b000b100b200b300} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x1b, al=b400b500000000000000000000000000} ProbeDirEnt {status=0x00, name=»GENNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=b600b700b800b900ba00bb00bc000000} ProbeDirEnt {status=0x00, name=»LOCAL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=bd00be00bf00c000c100c20000000000} ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c300c400c500c600c700c800c900ca00} ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x01, al=cb000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cc00cd00ce00cf00d000d100d200d300} ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=d4000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»MEM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=d500d600d70000000000000000000000} ProbeDirEnt {status=0x00, name=»NAMES CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7d, al=d800d900da00db00dc00dd00de00df00} ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e000e100e200e300e400e500e600e700} ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x33, al=e800e900ea00eb000000000000000000} ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ec00ed00ee00ef00f000f100f200f300} ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=f4000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f500f600f700f800f900fa00fb00fc00} ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x0a, al=fd000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=fe00ff00000101010201030104010501} ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x32, al=06010701080109010000000000000000} ProbeDirEnt {status=0x00, name=»NETOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0a010b010c010d010e010f0110011101} ProbeDirEnt {status=0x00, name=»NETON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=12011301140115011601170118011901} ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1a011b011c011d011e011f0120012101} ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=22010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=23012401250126012701280129012a01} 0x0008800 (2, 0, 3) ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2b012c012d012e012f01300131013201} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2a, al=33013401350100000000000000000000} ProbeDirEnt {status=0x00, name=»NIOS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=36010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NIOS1 CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=37010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»PIN750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=38013901000000000000000000000000} ProbeDirEnt {status=0x00, name=»R CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=3a010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RDEF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=3b010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»REMOTE CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=3c013d01000000000000000000000000} ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x39, al=3e013f01400141010000000000000000} ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=42014301440145014601470148014901} ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x55, al=4a014b014c014d014e014f0100000000} ProbeDirEnt {status=0x00, name=»RSDEF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=50010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=51015201530154015501560157015801} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=59015a015b015c015d015e015f016001} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x05, al=61010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RTM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=62016301640165010000000000000000} ProbeDirEnt {status=0x00, name=»SCROLL RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=66010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»SDEF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=67010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=680169016a016b016c016d016e016f01} ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=70017101000000000000000000000000} ProbeDirEnt {status=0x00, name=»SPL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=72017301740175017601770178017901} ProbeDirEnt {status=0x00, name=»SPL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x25, al=7a017b017c0100000000000000000000} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7d017e017f0180018101820183018401} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=850186018701880189018a018b018c01} 0x0008c00 (2, 0, 4) ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x07, al=8d010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»STDKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=8e010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»SUP CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=8f019001910100000000000000000000} ProbeDirEnt {status=0x00, name=»SYSDAT CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=92019301000000000000000000000000} ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x38, al=94019501960197010000000000000000} ProbeDirEnt {status=0x00, name=»VOUT RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x17, al=98019901000000000000000000000000} ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9a019b019c019d019e019f01a001a101} ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=a201a301a401a501a601a701a801a901} ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x04, al=aa010000000000000000000000000000} 0x0009000 (2, 0, 5) 0x0009400 (2, 0, 6) 0x0009800 (2, 0, 7) 0x0009c00 (2, 0, 8) 0x000a000 (2, 1, 1) 0x000a400 (2, 1, 2) 0x000a800 (2, 1, 3) 0x000ac00 (2, 1, 4) 0x000b000 (2, 1, 5) 0x000b400 (2, 1, 6) 0x000b800 (2, 1, 7) 0x000bc00 (2, 1, 8) + 81 - 0 <Tree 0x0-0x9a000-0x134000> + 80 - 10 <Tree 0x0-0x9a000-0x134000>