|
DataMuseum.dkPresents historical artifacts from the history of: CP/M |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about CP/M Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - download
Length: 157696 (0x26800) Description: Bits:30002716 SW1545 VISTA Programmering REL 1.0 DATANI/RC (defekt) Types: 5¼" Floppy Disk
Geometry: [[0, 0, 1], [76, 1, 1]] First credible dirsect is: (2, 0, 1) at 0x1000 with 0x8 attribute records Credible directory tracks: (2, 0) 0x1000 26 (2, 1) 0x1400 2 Total credibility: 26 Block number width: guess16 8 0 8 178 155 True 16 0 8 185 0 True 00:SKEMA CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00} 00:SKEMA CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700} 00:SKEMA CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00} 00:SKEMA CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700} 00:SKEMA CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA CMD«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00} 00:SKEMA CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA CMD«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700} 00:SKEMA CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA CMD«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00} 00:SKEMA CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA CMD«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700} 00:SKEMA CMD rc=0x040 c=0x004 ProbeDirEnt {status=0x00, name=»SKEMA CMD«, xl=0x08, bc=0x00, xh=0x00, rc=0x40, al=480049004a004b000000000000000000} 00:VISETUP VSF rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4c004d004e004f005000510052005300} 00:VISETUP VSF rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=5400550056005700580059005a005b00} 00:VISETUP VSF rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=5c005d005e005f006000610062006300} 00:VISETUP VSF rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=6400650066006700680069006a006b00} 00:VISETUP VSF rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=6c006d006e006f007000710072007300} 00:VISETUP VSF rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=7400750076007700780079007a007b00} 00:VISETUP VSF rc=0x066 c=0x007 ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x06, bc=0x00, xh=0x00, rc=0x66, al=7c007d007e007f008000810082000000} 00:SKJDOK CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKJDOK CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=83008400850086008700880089008a00} 00:SKJDOK CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKJDOK CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=8b008c008d008e008f00900091009200} 00:SKJDOK CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKJDOK CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=93009400950096009700980099009a00} 00:SKJDOK CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKJDOK CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=9b009c009d009e009f00a000a100a200} 00:SKJDOK CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKJDOK CMD«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=a300a400a500a600a700a800a900aa00} 00:SKJDOK CMD rc=0x065 c=0x007 ProbeDirEnt {status=0x00, name=»SKJDOK CMD«, xl=0x05, bc=0x00, xh=0x00, rc=0x65, al=ab00ac00ad00ae00af00b000b1000000} 00:SKJCOPY CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKJCOPY CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b200b300b400b500b600b700b800b900} Block Size 2048.00 2048 extent_mask = 0x0 Candidate interleaves in order of directory credibility: Penalty Name Order Resulting dir order From the beastiarium: CpmFSCr16 +0/-0 File & label names found: (Using no interleave) 0x0001000 (2, 0, 1) ProbeDirEnt {status=0x20, name=»SW1545 1.0 «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000a20b1037a20b1037} ProbeDirEnt {status=0x00, name=»SKEMA CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00} ProbeDirEnt {status=0x00, name=»SKEMA CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700} ProbeDirEnt {status=0x00, name=»SKEMA CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00} ProbeDirEnt {status=0x00, name=»SKEMA CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700} ProbeDirEnt {status=0x00, name=»SKEMA CMD«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00} ProbeDirEnt {status=0x00, name=»SKEMA CMD«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700} ProbeDirEnt {status=0x00, name=»SKEMA CMD«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00} ProbeDirEnt {status=0x00, name=»SKEMA CMD«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700} ProbeDirEnt {status=0x00, name=»SKEMA CMD«, xl=0x08, bc=0x00, xh=0x00, rc=0x40, al=480049004a004b000000000000000000} ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4c004d004e004f005000510052005300} ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=5400550056005700580059005a005b00} ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=5c005d005e005f006000610062006300} ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=6400650066006700680069006a006b00} ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=6c006d006e006f007000710072007300} ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=7400750076007700780079007a007b00} ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x06, bc=0x00, xh=0x00, rc=0x66, al=7c007d007e007f008000810082000000} ProbeDirEnt {status=0x00, name=»SKJDOK CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=83008400850086008700880089008a00} ProbeDirEnt {status=0x00, name=»SKJDOK CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=8b008c008d008e008f00900091009200} ProbeDirEnt {status=0x00, name=»SKJDOK CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=93009400950096009700980099009a00} ProbeDirEnt {status=0x00, name=»SKJDOK CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=9b009c009d009e009f00a000a100a200} ProbeDirEnt {status=0x00, name=»SKJDOK CMD«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=a300a400a500a600a700a800a900aa00} ProbeDirEnt {status=0x00, name=»SKJDOK CMD«, xl=0x05, bc=0x00, xh=0x00, rc=0x65, al=ab00ac00ad00ae00af00b000b1000000} ProbeDirEnt {status=0x00, name=»SKJCOPY CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b200b300b400b500b600b700b800b900} 0x0001400 (2, 1, 1)