DataMuseum.dk

Presents historical artifacts from the history of:

CP/M

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CP/M

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics
Index: 5 7 C I K S T V

⟦47c2467e0⟧ Bits:30003943 SW1544 VISTA Database Rel. 1.1, 5¼" Floppy Disk, CpmFSAuto, ImdContainer

    Length: 1261568 (0x134000)
    Description: Bits:30003943 SW1544 VISTA Database Rel. 1.1
    Types: 5¼" Floppy Disk, CpmFSAuto, ImdContainer
    Notes: CpmFSAuto_1024_2048_0x0_512_*1+1_2:0_76:1, CpmFSAuto_1024_2048_0x0_512_*2+1+2_2:0_76:1

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         CpmFSAuto_1024_2048_0x0_512_*1+1_2:0_76:1
Confidence score:  +37/-0
Sector size:       1024
Block size:        2048
Directory entries: 512
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0 0 1152 7BIT.POF ⟦cc571c96b⟧
0 0 1152 IBM.POF ⟦c2b05b3d0⟧
0 0 512 INSTJOB.SUB ⟦39b8b81d2⟧ TextFile
0 0 1152 KARAKTER.POF ⟦ced251668⟧
0 0 81664 SKEMA.EXE ⟦9a3b7181c⟧
0 0 210304 VIPS.EXE ⟦fc1f5f867⟧
0 0 146432 VISETUP.VSF ⟦abdd745ce⟧
0 0 640 VISTA.SYS ⟦e04699c57⟧
0 0 71808 VISUP.EXE ⟦00b636183⟧

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         CpmFSAuto_1024_2048_0x0_512_*2+1+2_2:0_76:1
Confidence score:  +37/-0
Sector size:       1024
Block size:        2048
Directory entries: 512
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 3, 5, 7, 2, 4, 6, 8
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0 0 1152 7BIT.POF ⟦dff9fd7a1⟧
0 0 1152 IBM.POF ⟦e056c3197⟧
0 0 512 INSTJOB.SUB ⟦a81bf4818⟧
0 0 1152 KARAKTER.POF ⟦5f1acabcd⟧
0 0 81664 SKEMA.EXE ⟦d88052321⟧
0 0 210304 VIPS.EXE ⟦27a4cd3e3⟧
0 0 146432 VISETUP.VSF ⟦262033827⟧
0 0 640 VISTA.SYS ⟦7e390c065⟧
0 0 71808 VISUP.EXE ⟦f6e4adc61⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 8]]

First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x8000 25-17-2-2-2-2-2-2
   (2, 1)  0xa000 2-2-2-2-2-2-2-2

Total credibility: 54

Block number width: ok16

   8    83     1   191   156  False
  16     0     8   331     0  False

Block Sizes:
    2048 0x00 +37 -0
    4096 0x01 +5 -32
    8192 0x03 +5 -32
   16384 0x07 +5 -32
   32768 0x0f +5 -32
   65536 0x1f +5 -32
    1024 0x00 +2 -35
     512 0x00 +1 -36
     128 0x00 +0 -37
     256 0x00 +0 -37

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5-6-7-8)                                                         [24, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +37/-0
     15  normal-2     (1-3-5-7-2-4-6-8)                                                         [24, 1, 1, 1, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +37/-0
     15  normal-3     (1-4-7-2-5-8-3-6)                                                         [24, 1, 1, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +37/-1
From the beastiarium: CpmFSCr16   +0/-0

File & label names found:
  0x0008000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»SW1544 1.1 «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000560d1954560d1954}
    ProbeDirEnt {status=0x00, name=»IBM     POF«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=08000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=09000a000b000c000d000e000f001000}
    ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=11001200130014001500160017001800}
    ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=19001a001b001c001d001e001f002000}
    ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=21002200230024002500260027002800}
    ProbeDirEnt {status=0x00, name=»SKEMA   EXE«, xl=0x04, bc=0x00, xh=0x00, rc=0x7e, al=29002a002b002c002d002e002f003000}
    ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=31003200330034003500360037003800}
    ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=39003a003b003c003d003e003f004000}
    ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=41004200430044004500460047004800}
    ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=49004a004b004c004d004e004f005000}
    ProbeDirEnt {status=0x00, name=»VISUP   EXE«, xl=0x04, bc=0x00, xh=0x00, rc=0x31, al=51005200530054000000000000000000}
    ProbeDirEnt {status=0x00, name=»KARAKTERPOF«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=55000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=70007100720073007400750076007700}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=780079007a007b007c007d007e007f00}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=80008100820083008400850086008700}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=880089008a008b008c008d008e008f00}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=90009100920093009400950096009700}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=980099009a009b009c009d009e009f00}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=a000a100a200a300a400a500a600a700}
  0x0008400 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x0a, bc=0x00, xh=0x00, rc=0x80, al=a800a900aa00ab00ac00ad00ae00af00}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x0b, bc=0x00, xh=0x00, rc=0x80, al=b000b100b200b300b400b500b600b700}
    ProbeDirEnt {status=0x00, name=»VIPS    EXE«, xl=0x0c, bc=0x00, xh=0x00, rc=0x6b, al=b800b900ba00bb00bc00bd00be000000}
    ProbeDirEnt {status=0x00, name=»VISTA   SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=bf000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»7BIT    POF«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=02010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»INSTJOB SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x04, al=03010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0401050106010701080109010a010b01}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=0c010d010e010f011001110112011301}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=1401150116011701180119011a011b01}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=1c011d011e011f012001210122012301}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=2401250126012701280129012a012b01}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=2c012d012e012f013001310132013301}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=3401350136013701380139013a013b01}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=3c013d013e013f014001410142014301}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x08, bc=0x00, xh=0x00, rc=0x78, al=4401450146014701480149014a014b01}
  0x0008800 (2, 0, 3)
  0x0008c00 (2, 0, 4)
  0x0009000 (2, 0, 5)
  0x0009400 (2, 0, 6)
  0x0009800 (2, 0, 7)
  0x0009c00 (2, 0, 8)
  0x000a000 (2, 1, 1)
  0x000a400 (2, 1, 2)
  0x000a800 (2, 1, 3)
  0x000ac00 (2, 1, 4)
  0x000b000 (2, 1, 5)
  0x000b400 (2, 1, 6)
  0x000b800 (2, 1, 7)
  0x000bc00 (2, 1, 8)
+  37 -   0 <Tree 0x0-0x9a000-0x134000>
+  37 -   0 <Tree 0x0-0x9a000-0x134000>
+  37 -   1 <Tree 0x0-0x9a000-0x134000>

Full view