DataMuseum.dk

Presents historical artifacts from the history of:

CP/M

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CP/M

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: 5 A B C D E F H I M P S T V W

⟦5b35a3f8b⟧ Bits:30002866 MicroPro WordStar release 3.00 for JET80, 5¼" Floppy Disk, CpmFSAuto

    Length: 819200 (0xc8000)
    Description: Bits:30002866 MicroPro WordStar release 3.00 for JET80
    Types: 5¼" Floppy Disk, CpmFSAuto
    Notes: CpmFSAuto,1024,2048,64,0x0,1,1:0-79:1

CpmFSAuto

Media:             [0, 0, 1] … [79, 1, 5] {1024: 800}
Signature:         CpmFSAuto,1024,2048,64,0x0,1,1:0-79:1
Confidence score:  +42/-0
Sector size:       1024
Block size:        2048
Directory entries: 64
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 2, 3, 4, 5
Tracks:            (1, 0), (1, 1), (2, 0), (2, 1), (3, 0), (3, 1) […] (77, 0), (77, 1), (78, 0), (78, 1), (79, 0), (79, 1)
user bc length name artifact
0 0 512 APPSTAT.FRM ⟦cc687fb55⟧ TextFile
0 0 896 APPTAL.CMD ⟦5afc86684⟧ TextFile
0 0 768 BIL.CMD ⟦2592a9cf8⟧ TextFile
0 0 384 BIL2.CMD ⟦a184d7740⟧ TextFile
0 0 3200 CCP.COM ⟦d5f2012fa⟧
0 0 21760 CPM3.SYS ⟦be04209af⟧
0 0 3072 D.COM ⟦cefd77dc2⟧
0 0 7424 DEVICE.COM ⟦220e51042⟧
0 0 14592 DIR.COM ⟦19adf2b74⟧
0 0 896 DIST.CMD ⟦96e849a53⟧ TextFile
0 0 384 EDIT.CMD ⟦e12e34fc6⟧ TextFile
0 0 3456 FASTCOPY.COM ⟦08624979f⟧
0 0 768 FKTNUM.CMD ⟦52dc07262⟧ TextFile
0 0 8576 HPPRISEC.COM ⟦03ac54b21⟧
0 0 384 INDTAST.CMD ⟦91b0badc1⟧ TextFile
0 0 7680 MAILMRGE.OVR ⟦0993c9bf8⟧
0 0 8704 PIP.COM ⟦acce36279⟧
0 0 128 PROFILE.SUB ⟦cbf6e582a⟧ TextFile
0 0 1792 SAVE.COM ⟦d9ae482b5⟧
0 0 1920 SIOJET.COM ⟦4525ffdf2⟧
0 0 1536 SKBOOT.COM ⟦83b40604b⟧
0 0 512 SLUTVSYS.CMD ⟦a654ff44c⟧ TextFile
0 0 5248 SPELSTAR.DCT ⟦f53b88aee⟧
0 0 18432 SPELSTAR.OVR ⟦9aff36fda⟧
0 0 5376 SUBMIT.COM ⟦2e0941854⟧
0 0 768 VMEN.CMD ⟦fb65ad61a⟧ TextFile
0 0 29184 WINSTALL.COM ⟦aeb19f846⟧
0 0 15872 WS.COM ⟦0c33b7b9d⟧
0 0 50304 WS.INS ⟦54269d92b⟧
0 0 32768 WSINSTAL.COM ⟦2d889f84f⟧
0 0 27904 WSMSGS.OVR ⟦e1792b75e⟧
0 0 34048 WSOVLY1.OVR ⟦4af3480aa⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [79, 1, 5]]

First credible dirsect is: (1, 0, 1) at 0x2800 with 0x0 attribute records

Credible directory tracks:
   (1, 0)  0x2800 28-16-1-1-0

Total credibility: 42

Block number width: ok16

   8     0     2   175   125  False
  16     0     2   175     0  False

00:CCP     COM rc=0x019 c=0x002 ProbeDirEnt {status=0x00, name=»CCP     COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=02000300000000000000000000000000}
00:DEVICE  COM rc=0x03a c=0x004 ProbeDirEnt {status=0x00, name=»DEVICE  COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=05000600070008000000000000000000}
00:SKBOOT  COM rc=0x00c c=0x001 ProbeDirEnt {status=0x00, name=»SKBOOT  COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x0c, al=09000000000000000000000000000000}
00:SIOJET  COM rc=0x00f c=0x001 ProbeDirEnt {status=0x00, name=»SIOJET  COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=0a000000000000000000000000000000}
00:CPM3    SYS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»CPM3    SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0b000c000d000e000f00100011001200}
00:CPM3    SYS rc=0x02a c=0x003 ProbeDirEnt {status=0x00, name=»CPM3    SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x2a, al=13001400150000000000000000000000}
00:DIR     COM rc=0x072 c=0x008 ProbeDirEnt {status=0x00, name=»DIR     COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x72, al=16001700180019001a001b001c001d00}
00:D       COM rc=0x018 c=0x002 ProbeDirEnt {status=0x00, name=»D       COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=1e001f00000000000000000000000000}
00:PIP     COM rc=0x044 c=0x005 ProbeDirEnt {status=0x00, name=»PIP     COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x44, al=20002100220023002400000000000000}
00:SUBMIT  COM rc=0x02a c=0x003 ProbeDirEnt {status=0x00, name=»SUBMIT  COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x2a, al=25002600270000000000000000000000}
00:WINSTALLCOM rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»WINSTALLCOM«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00}
00:WINSTALLCOM rc=0x064 c=0x007 ProbeDirEnt {status=0x00, name=»WINSTALLCOM«, xl=0x01, bc=0x00, xh=0x00, rc=0x64, al=30003100320033003400350036000000}
00:WS      COM rc=0x07c c=0x008 ProbeDirEnt {status=0x00, name=»WS      COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x7c, al=3700380039003a003b003c003d003e00}
00:WSMSGS  OVR rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»WSMSGS  OVR«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=3f004000410042004300440045004600}
00:WSMSGS  OVR rc=0x05a c=0x006 ProbeDirEnt {status=0x00, name=»WSMSGS  OVR«, xl=0x01, bc=0x00, xh=0x00, rc=0x5a, al=4700480049004a004b004c0000000000}
00:WSOVLY1 OVR rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»WSOVLY1 OVR«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4d004e004f0050005100520053005400}
00:WSOVLY1 OVR rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»WSOVLY1 OVR«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=550056005700580059005a005b005c00}
00:WSOVLY1 OVR rc=0x00a c=0x001 ProbeDirEnt {status=0x00, name=»WSOVLY1 OVR«, xl=0x02, bc=0x00, xh=0x00, rc=0x0a, al=5d000000000000000000000000000000}
00:WS      INS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»WS      INS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5e005f00600061006200630064006500}
00:WS      INS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»WS      INS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=66006700680069006a006b006c006d00}
00:WS      INS rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»WS      INS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=6e006f00700071007200730074007500}
00:WS      INS rc=0x009 c=0x001 ProbeDirEnt {status=0x00, name=»WS      INS«, xl=0x03, bc=0x00, xh=0x00, rc=0x09, al=76000000000000000000000000000000}
00:WSINSTALCOM rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»WSINSTALCOM«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7700780079007a007b007c007d007e00}
00:WSINSTALCOM rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»WSINSTALCOM«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=7f008000810082008300840085008600}
00:PROFILE SUB rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»PROFILE SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=88000000000000000000000000000000}
00:FASTCOPYCOM rc=0x01b c=0x002 ProbeDirEnt {status=0x00, name=»FASTCOPYCOM«, xl=0x00, bc=0x00, xh=0x00, rc=0x1b, al=89008a00000000000000000000000000}
00:BIL     CMD rc=0x006 c=0x001 ProbeDirEnt {status=0x00, name=»BIL     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x06, al=8b000000000000000000000000000000}
00:DIST    CMD rc=0x007 c=0x001 ProbeDirEnt {status=0x00, name=»DIST    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x07, al=8f000000000000000000000000000000}
00:APPTAL  CMD rc=0x007 c=0x001 ProbeDirEnt {status=0x00, name=»APPTAL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x07, al=90000000000000000000000000000000}
00:SLUTVSYSCMD rc=0x004 c=0x001 ProbeDirEnt {status=0x00, name=»SLUTVSYSCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x04, al=92000000000000000000000000000000}
00:APPSTAT FRM rc=0x004 c=0x001 ProbeDirEnt {status=0x00, name=»APPSTAT FRM«, xl=0x00, bc=0x00, xh=0x00, rc=0x04, al=93000000000000000000000000000000}
00:HPPRISECCOM rc=0x043 c=0x005 ProbeDirEnt {status=0x00, name=»HPPRISECCOM«, xl=0x00, bc=0x00, xh=0x00, rc=0x43, al=94009c009d009e009f00000000000000}
00:FKTNUM  CMD rc=0x006 c=0x001 ProbeDirEnt {status=0x00, name=»FKTNUM  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x06, al=95000000000000000000000000000000}
00:VMEN    CMD rc=0x006 c=0x001 ProbeDirEnt {status=0x00, name=»VMEN    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x06, al=97000000000000000000000000000000}
00:INDTAST CMD rc=0x003 c=0x001 ProbeDirEnt {status=0x00, name=»INDTAST CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=98000000000000000000000000000000}
00:BIL2    CMD rc=0x003 c=0x001 ProbeDirEnt {status=0x00, name=»BIL2    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=99000000000000000000000000000000}
00:SAVE    COM rc=0x00e c=0x001 ProbeDirEnt {status=0x00, name=»SAVE    COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=9a000000000000000000000000000000}
00:EDIT    CMD rc=0x003 c=0x001 ProbeDirEnt {status=0x00, name=»EDIT    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=9b000000000000000000000000000000}
00:MAILMRGEOVR rc=0x03c c=0x004 ProbeDirEnt {status=0x00, name=»MAILMRGEOVR«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=a000a100a200a3000000000000000000}
00:SPELSTARDCT rc=0x029 c=0x003 ProbeDirEnt {status=0x00, name=»SPELSTARDCT«, xl=0x00, bc=0x00, xh=0x00, rc=0x29, al=a400a500a60000000000000000000000}
00:SPELSTAROVR rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SPELSTAROVR«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a700a800a900aa00ab00ac00ad00ae00}
00:SPELSTAROVR rc=0x010 c=0x001 ProbeDirEnt {status=0x00, name=»SPELSTAROVR«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=af000000000000000000000000000000}
Block Size 2048.00 2048 extent_mask = 0x0

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5)                                                               [27, 15]   +42/-0

File & label names found:
  0x0002800 (1, 0, 1)
    ProbeDirEnt {status=0x00, name=»CCP     COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=02000300000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DEVICE  COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=05000600070008000000000000000000}
    ProbeDirEnt {status=0x00, name=»SKBOOT  COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x0c, al=09000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SIOJET  COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=0a000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CPM3    SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0b000c000d000e000f00100011001200}
    ProbeDirEnt {status=0x00, name=»CPM3    SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x2a, al=13001400150000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DIR     COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x72, al=16001700180019001a001b001c001d00}
    ProbeDirEnt {status=0x00, name=»D       COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=1e001f00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PIP     COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x44, al=20002100220023002400000000000000}
    ProbeDirEnt {status=0x00, name=»SUBMIT  COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x2a, al=25002600270000000000000000000000}
    ProbeDirEnt {status=0x00, name=»WINSTALLCOM«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00}
    ProbeDirEnt {status=0x00, name=»WINSTALLCOM«, xl=0x01, bc=0x00, xh=0x00, rc=0x64, al=30003100320033003400350036000000}
    ProbeDirEnt {status=0x00, name=»WS      COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x7c, al=3700380039003a003b003c003d003e00}
    ProbeDirEnt {status=0x00, name=»WSMSGS  OVR«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=3f004000410042004300440045004600}
    ProbeDirEnt {status=0x00, name=»WSMSGS  OVR«, xl=0x01, bc=0x00, xh=0x00, rc=0x5a, al=4700480049004a004b004c0000000000}
    ProbeDirEnt {status=0x00, name=»WSOVLY1 OVR«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4d004e004f0050005100520053005400}
    ProbeDirEnt {status=0x00, name=»WSOVLY1 OVR«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=550056005700580059005a005b005c00}
    ProbeDirEnt {status=0x00, name=»WSOVLY1 OVR«, xl=0x02, bc=0x00, xh=0x00, rc=0x0a, al=5d000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»WS      INS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5e005f00600061006200630064006500}
    ProbeDirEnt {status=0x00, name=»WS      INS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=66006700680069006a006b006c006d00}
    ProbeDirEnt {status=0x00, name=»WS      INS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=6e006f00700071007200730074007500}
    ProbeDirEnt {status=0x00, name=»WS      INS«, xl=0x03, bc=0x00, xh=0x00, rc=0x09, al=76000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»WSINSTALCOM«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7700780079007a007b007c007d007e00}
    ProbeDirEnt {status=0x00, name=»WSINSTALCOM«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=7f008000810082008300840085008600}
    ProbeDirEnt {status=0x00, name=»PROFILE SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=88000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»FASTCOPYCOM«, xl=0x00, bc=0x00, xh=0x00, rc=0x1b, al=89008a00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»BIL     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x06, al=8b000000000000000000000000000000}
  0x0002c00 (1, 0, 2)
    ProbeDirEnt {status=0x00, name=»DIST    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x07, al=8f000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»APPTAL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x07, al=90000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SLUTVSYSCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x04, al=92000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»APPSTAT FRM«, xl=0x00, bc=0x00, xh=0x00, rc=0x04, al=93000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»HPPRISECCOM«, xl=0x00, bc=0x00, xh=0x00, rc=0x43, al=94009c009d009e009f00000000000000}
    ProbeDirEnt {status=0x00, name=»FKTNUM  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x06, al=95000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»VMEN    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x06, al=97000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»INDTAST CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=98000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»BIL2    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=99000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SAVE    COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=9a000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»EDIT    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=9b000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MAILMRGEOVR«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=a000a100a200a3000000000000000000}
    ProbeDirEnt {status=0x00, name=»SPELSTARDCT«, xl=0x00, bc=0x00, xh=0x00, rc=0x29, al=a400a500a60000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SPELSTAROVR«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a700a800a900aa00ab00ac00ad00ae00}
    ProbeDirEnt {status=0x00, name=»SPELSTAROVR«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=af000000000000000000000000000000}
+  42 -   0 <Tree 0x0-0x64000-0xc8000>

Full view