DataMuseum.dk

Presents historical artifacts from the history of:

CP/M

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CP/M

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics
Index: 5 A B C D G I L M N P R S T V X

⟦57374e1c8⟧ Bits:30002686 SW1400-10 Piccoline Distributions system 2.3 - disk 2/4, Bits:30004538/disk2.imd SW1400-10 Piccoline Distributions system 2.3, 5¼" Floppy Disk, CpmFSAuto, ImdContainer

    Length: 1261568 (0x134000)
    Description: Bits:30004538/disk2.imd SW1400-10 Piccoline Distributions system 2.3
    Description: Bits:30002686 SW1400-10 Piccoline Distributions system 2.3 - disk 2/4
    Types: 5¼" Floppy Disk, CpmFSAuto, ImdContainer
    Notes: CpmFSAuto_1024_2048_0x0_512_*1+1_2:0_76:1

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         CpmFSAuto_1024_2048_0x0_512_*1+1_2:0_76:1
Confidence score:  +92/-0
Sector size:       1024
Block size:        2048
Directory entries: 512
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0 0 12544 ADDNET.CMD ⟦5b727c266⟧
0 0 15744 BDOS.CON ⟦535d34f2b⟧
0 0 123136 CCPM.SYS ⟦5fca4f039⟧
0 0 95104 CCPM1.SYS ⟦7592820e8⟧
0 0 104704 CCPM4.SYS ⟦8743fd40e⟧
0 0 5504 CIO.CON ⟦75c8e9dde⟧
0 0 640 CLOCK.RSP ⟦9b24ff61d⟧
0 0 24192 CPADDNET.CMD ⟦2230ef36d⟧
0 0 41344 CPGENNET.CMD ⟦32cb584f7⟧
0 0 29312 DRNET.CMD ⟦9435652d1⟧
0 0 12800 DSP.CMD ⟦acf6871d9⟧
0 0 52608 GENCCPM.CMD ⟦d1549c14d⟧
0 0 12544 GENNET.CMD ⟦cb9d43b50⟧
0 0 11392 LOCAL.CMD ⟦df81e6a32⟧
0 0 16512 LOGOFF.CMD ⟦054f6893e⟧
0 0 18432 LOGON.CMD ⟦4eccef5fe⟧
0 0 6144 MEM.CON ⟦aa42f5e9f⟧
0 0 16000 NAMES.CMD ⟦003bd88d2⟧
0 0 22912 NAMESMOD.CMD ⟦ea69a1aa9⟧
0 0 17536 NET.CMD ⟦4f982e6be⟧
0 0 17664 NETDRV.RSP ⟦6de4aef19⟧
0 0 22784 NETDRVB.RSP ⟦8077c95d5⟧
0 0 16384 NETOFF.CMD ⟦8243b6545⟧
0 0 16384 NETON.CMD ⟦73b901ebb⟧
0 0 17920 NETSTAT.CMD ⟦c67d05638⟧
0 0 38272 NETVEDL.CMD ⟦099ebc038⟧
0 0 1792 NIOS.CMD ⟦ff28041a4⟧
0 0 1792 NIOS1.CMD ⟦ea6840b62⟧
0 0 3328 PIN.RSP ⟦65c9cbd7d⟧
0 0 1152 R.CMD ⟦fda426646⟧
0 0 128 RDEF1 ⟦6ffaa521c⟧ TextFile
0 0 128 RDEF4 ⟦49338253a⟧ TextFile
0 0 27264 RNET.CMD ⟦61aa2ab88⟧
0 0 128 RSDEF1 ⟦304ce49ff⟧ TextFile
0 0 128 RSDEF4 ⟦7f3f51e99⟧ TextFile
0 0 33408 RSNET.CMD ⟦b95abc5eb⟧
0 0 7552 RTM.CON ⟦9c2ee7491⟧
0 0 640 SCROLL.RSP ⟦a29593a77⟧
0 0 128 SDEF ⟦4eb454ef9⟧ TextFile
0 0 19712 SNET.CMD ⟦0f588d411⟧
0 0 21120 SPL.CMD ⟦ffcd99468⟧
0 0 33664 SPOOL.CMD ⟦0eeb85111⟧
0 0 256 STDKONF ⟦5ddf5f22d⟧ TextFile
0 0 5632 SUP.CON ⟦d9b79db5d⟧
0 0 3328 SYSDAT.CON ⟦13f8b41e3⟧
0 0 7168 TMP759.RSP ⟦87ee6d2ba⟧
0 0 2944 VOUT.RSP ⟦f665ed891⟧
0 0 25728 XIOS1.CON ⟦6e52c1cac⟧
0 0 29440 XIOS4.CON ⟦7ac3a6b99⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 8]]

First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x8000 26-26-26-23-2-2-2-2
   (2, 1)  0xa000 2-2-2-2-2-2-2-2

Total credibility: 109

Block number width: ok16

   8   296     1   255   216  False
  16     0     8   519     0  False

Block Sizes:
    2048 0x00 +92 -0
    1024 0x00 +11 -81
    4096 0x01 +11 -81
    8192 0x03 +11 -81
   16384 0x07 +11 -81
   32768 0x0f +11 -81
   65536 0x1f +11 -81
     256 0x00 +7 -85
     512 0x00 +7 -85
     128 0x00 +6 -86

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5-6-7-8)                                                         [25, 25, 25, 22, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +92/-0
     24  normal-2     (1-3-5-7-2-4-6-8)                                                         [25, 25, 1, 1, 25, 22, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +92/-21
     48  normal-3     (1-4-7-2-5-8-3-6)                                                         [25, 22, 1, 25, 1, 1, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1]   +92/-18
From the beastiarium: CpmFSCr16   +0/-0

File & label names found:
  0x0008000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»PIC 2-3.2-3«, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000520a1106520a1106}
    ProbeDirEnt {status=0x00, name=»ADDNET  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=080009000a000b000c000d000e000000}
    ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x7b, al=0f001000110012001300140015001600}
    ProbeDirEnt {status=0x00, name=»CIO     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=17001800190000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CLOCK   RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=1a000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1b001c001d001e001f00200021002200}
    ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x3d, al=23002400250026000000000000000000}
    ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2700280029002a002b002c002d002e00}
    ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2f003000310032003300340035003600}
    ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x43, al=3700380039003a003b00000000000000}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=3c003d003e003f004000410042004300}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=4400450046004700480049004a004b00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=4c004d004e004f005000510052005300}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=5400550056005700580059005a005b00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=5c005d005e005f006000610062006300}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=6400650066006700680069006a006b00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=6c006d006e006f007000710072007300}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x42, al=74007500760077007800000000000000}
    ProbeDirEnt {status=0x00, name=»XIOS4   CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=79007a007b007c007d007e007f008000}
    ProbeDirEnt {status=0x00, name=»XIOS4   CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x66, al=81008200830084008500860087000000}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=880089008a008b008c008d008e008f00}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=90009100920093009400950096009700}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=980099009a009b009c009d009e009f00}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=a000a100a200a300a400a500a600a700}
  0x0008400 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=a800a900aa00ab00ac00ad00ae00af00}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x67, al=b000b100b200b300b400b500b6000000}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b700b800b900ba00bb00bc00bd00be00}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=bf00c000c100c200c300c400c500c600}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=c700c800c900ca00cb00cc00cd00ce00}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=cf00d000d100d200d300d400d500d600}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=d700d800d900da00db00dc00dd00de00}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=df00e000e100e200e300e400e500e600}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x32, al=e700e800e900ea000000000000000000}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=eb00ec00ed00ee00ef00f000f100f200}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f300f400f500f600f700f800f900fa00}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=fb00fc00fd00fe00ff00000101010201}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x1b, al=03010401000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»GENNET  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=050106010701080109010a010b010000}
    ProbeDirEnt {status=0x00, name=»MEM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=0c010d010e0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0f011001110112011301140115011601}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x0a, al=17010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DRNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=180119011a011b011c011d011e011f01}
    ProbeDirEnt {status=0x00, name=»DRNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x65, al=20012101220123012401250126010000}
    ProbeDirEnt {status=0x00, name=»PIN     RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=27012801000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»R       CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=29010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2a012b012c012d012e012f0130013101}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x55, al=32013301340135013601370100000000}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=380139013a013b013c013d013e013f01}
  0x0008800 (2, 0, 3)
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=40014101420143014401450146014701}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x05, al=48010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TMP759  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x38, al=49014a014b014c010000000000000000}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4d014e014f0150015101520153015401}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=550156015701580159015a015b015c01}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2b, al=5d015e015f0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=60016101620163016401650166016701}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=68016901000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SUP     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=6a016b016c0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»SYSDAT  CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=6d016e01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»VOUT    RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x17, al=6f017001000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RTM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=71017201730174010000000000000000}
    ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=750176017701780179017a017b017c01}
    ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x01, al=7d010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NAMES   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7d, al=7e017f01800181018201830184018501}
    ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=86018701880189018a018b018c018d01}
    ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=8e010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8f019001910192019301940195019601}
    ProbeDirEnt {status=0x00, name=»SPL     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9701980199019a019b019c019d019e01}
    ProbeDirEnt {status=0x00, name=»SPL     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x25, al=9f01a001a10100000000000000000000}
    ProbeDirEnt {status=0x00, name=»LOCAL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=a201a301a401a501a601a70100000000}
    ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a801a901aa01ab01ac01ad01ae01af01}
    ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=b0010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b101b201b301b401b501b601b701b801}
  0x0008c00 (2, 0, 4)
    ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x33, al=b901ba01bb01bc010000000000000000}
    ProbeDirEnt {status=0x00, name=»NETOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=bd01be01bf01c001c101c201c301c401}
    ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c501c601c701c801c901ca01cb01cc01}
    ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=cd010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ce01cf01d001d101d201d301d401d501}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d601d701d801d901da01db01dc01dd01}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x07, al=de010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NIOS    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=df010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DSP     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x64, al=e001e101e201e301e401e501e6010000}
    ProbeDirEnt {status=0x00, name=»SDEF       «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=e7010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RDEF4      «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=e8010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RDEF1      «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=e9010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RSDEF4     «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=ea010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RSDEF1     «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=eb010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»STDKONF    «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=ec010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SCROLL  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=ed010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ee01ef01f001f101f201f301f401f501}
    ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x32, al=f601f701f801f9010000000000000000}
    ProbeDirEnt {status=0x00, name=»NIOS1   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=fa010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»XIOS1   CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=fb01fc01fd01fe01ff01000201020202}
    ProbeDirEnt {status=0x00, name=»XIOS1   CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x49, al=03020402050206020702000000000000}
  0x0009000 (2, 0, 5)
  0x0009400 (2, 0, 6)
  0x0009800 (2, 0, 7)
  0x0009c00 (2, 0, 8)
  0x000a000 (2, 1, 1)
  0x000a400 (2, 1, 2)
  0x000a800 (2, 1, 3)
  0x000ac00 (2, 1, 4)
  0x000b000 (2, 1, 5)
  0x000b400 (2, 1, 6)
  0x000b800 (2, 1, 7)
  0x000bc00 (2, 1, 8)
+  92 -   0 <Tree 0x0-0x9a000-0x134000>
+  92 -  18 <Tree 0x0-0x9a000-0x134000>

Full view