DataMuseum.dk

Presents historical artifacts from the history of:

CP/M

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CP/M

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download

⟦589a221af⟧ Bits:30002716 SW1545 VISTA Programmering REL 1.0 DATANI/RC (defekt), 5¼" Floppy Disk

    Length: 157696 (0x26800)
    Description: Bits:30002716 SW1545 VISTA Programmering REL 1.0 DATANI/RC (defekt)
    Types: 5¼" Floppy Disk

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 1]]

First credible dirsect is: (2, 0, 1) at 0x1000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x1000 26
   (2, 1)  0x1400 2

Total credibility: 26

Block number width: guess16

   8     0     8   178   155   True
  16     0     8   185     0   True

00:SKEMA   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00}
00:SKEMA   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700}
00:SKEMA   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00}
00:SKEMA   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA   CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700}
00:SKEMA   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA   CMD«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00}
00:SKEMA   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA   CMD«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700}
00:SKEMA   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA   CMD«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00}
00:SKEMA   CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKEMA   CMD«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700}
00:SKEMA   CMD rc=0x040 c=0x004 ProbeDirEnt {status=0x00, name=»SKEMA   CMD«, xl=0x08, bc=0x00, xh=0x00, rc=0x40, al=480049004a004b000000000000000000}
00:VISETUP VSF rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4c004d004e004f005000510052005300}
00:VISETUP VSF rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=5400550056005700580059005a005b00}
00:VISETUP VSF rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=5c005d005e005f006000610062006300}
00:VISETUP VSF rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=6400650066006700680069006a006b00}
00:VISETUP VSF rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=6c006d006e006f007000710072007300}
00:VISETUP VSF rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=7400750076007700780079007a007b00}
00:VISETUP VSF rc=0x066 c=0x007 ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x06, bc=0x00, xh=0x00, rc=0x66, al=7c007d007e007f008000810082000000}
00:SKJDOK  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKJDOK  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=83008400850086008700880089008a00}
00:SKJDOK  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKJDOK  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=8b008c008d008e008f00900091009200}
00:SKJDOK  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKJDOK  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=93009400950096009700980099009a00}
00:SKJDOK  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKJDOK  CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=9b009c009d009e009f00a000a100a200}
00:SKJDOK  CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKJDOK  CMD«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=a300a400a500a600a700a800a900aa00}
00:SKJDOK  CMD rc=0x065 c=0x007 ProbeDirEnt {status=0x00, name=»SKJDOK  CMD«, xl=0x05, bc=0x00, xh=0x00, rc=0x65, al=ab00ac00ad00ae00af00b000b1000000}
00:SKJCOPY CMD rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SKJCOPY CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b200b300b400b500b600b700b800b900}
Block Size 2048.00 2048 extent_mask = 0x0

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
From the beastiarium: CpmFSCr16   +0/-0

File & label names found:
  (Using no interleave)
  0x0001000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»SW1545 1.0 «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000a20b1037a20b1037}
    ProbeDirEnt {status=0x00, name=»SKEMA   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00}
    ProbeDirEnt {status=0x00, name=»SKEMA   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700}
    ProbeDirEnt {status=0x00, name=»SKEMA   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00}
    ProbeDirEnt {status=0x00, name=»SKEMA   CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700}
    ProbeDirEnt {status=0x00, name=»SKEMA   CMD«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00}
    ProbeDirEnt {status=0x00, name=»SKEMA   CMD«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700}
    ProbeDirEnt {status=0x00, name=»SKEMA   CMD«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00}
    ProbeDirEnt {status=0x00, name=»SKEMA   CMD«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700}
    ProbeDirEnt {status=0x00, name=»SKEMA   CMD«, xl=0x08, bc=0x00, xh=0x00, rc=0x40, al=480049004a004b000000000000000000}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4c004d004e004f005000510052005300}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=5400550056005700580059005a005b00}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=5c005d005e005f006000610062006300}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=6400650066006700680069006a006b00}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=6c006d006e006f007000710072007300}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=7400750076007700780079007a007b00}
    ProbeDirEnt {status=0x00, name=»VISETUP VSF«, xl=0x06, bc=0x00, xh=0x00, rc=0x66, al=7c007d007e007f008000810082000000}
    ProbeDirEnt {status=0x00, name=»SKJDOK  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=83008400850086008700880089008a00}
    ProbeDirEnt {status=0x00, name=»SKJDOK  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=8b008c008d008e008f00900091009200}
    ProbeDirEnt {status=0x00, name=»SKJDOK  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=93009400950096009700980099009a00}
    ProbeDirEnt {status=0x00, name=»SKJDOK  CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=9b009c009d009e009f00a000a100a200}
    ProbeDirEnt {status=0x00, name=»SKJDOK  CMD«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=a300a400a500a600a700a800a900aa00}
    ProbeDirEnt {status=0x00, name=»SKJDOK  CMD«, xl=0x05, bc=0x00, xh=0x00, rc=0x65, al=ab00ac00ad00ae00af00b000b1000000}
    ProbeDirEnt {status=0x00, name=»SKJCOPY CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b200b300b400b500b600b700b800b900}
  0x0001400 (2, 1, 1)