|
|
DataMuseum.dkPresents historical artifacts from the history of: CP/M |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about CP/M Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metricsIndex: 5 A B C D G I L M N P R S T V X
Length: 1261568 (0x134000)
Description: Bits:30004537/disk2.imd SW1400 Piccoline Distributions system 2.2
Types: 5¼" Floppy Disk, CpmFSAuto, ImdContainer
Notes: CP/M-fs(1024_2048_0x0_*1+1_2:0_76:1_128)
Media: [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature: 1024_2048_0x0_*1+1_2:0_76:1_128
Confidence score: +114/-0
Sector size: 1024
Block size: 2048
Directory entries: 128
Block number size: 16
Extent-mask: 0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks: (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
| user | bc | length | name | artifact |
|---|---|---|---|---|
| 0 | 0 | 12544 | ADDNET.CMD | ⟦5b727c266⟧ |
| 0 | 0 | 15744 | BDOS.CON | ⟦c6238f917⟧ |
| 0 | 0 | 133632 | CCPM.SYS | ⟦6c4cddac6⟧ |
| 0 | 0 | 94848 | CCPM1.SYS | ⟦56afd7d58⟧ |
| 0 | 0 | 104448 | CCPM4.SYS | ⟦ac2e674ac⟧ |
| 0 | 0 | 5504 | CIO.CON | ⟦a0e22260b⟧ |
| 0 | 0 | 640 | CLOCK.RSP | ⟦9b24ff61d⟧ |
| 0 | 0 | 24192 | CPADDNET.CMD | ⟦2230ef36d⟧ |
| 0 | 0 | 41344 | CPGENNET.CMD | ⟦32cb584f7⟧ |
| 0 | 0 | 29312 | DRNET.CMD | ⟦812b320da⟧ |
| 0 | 0 | 12800 | DSP.CMD | ⟦acf6871d9⟧ |
| 0 | 0 | 52608 | GENCCPM.CMD | ⟦10bdc9af3⟧ |
| 0 | 0 | 12544 | GENNET.CMD | ⟦cb9d43b50⟧ |
| 0 | 0 | 11392 | LOCAL.CMD | ⟦df81e6a32⟧ |
| 0 | 0 | 16512 | LOGOFF.CMD | ⟦054f6893e⟧ |
| 0 | 0 | 18432 | LOGON.CMD | ⟦5c08fe7ab⟧ |
| 0 | 0 | 6144 | MEM.CON | ⟦b337452b1⟧ |
| 0 | 0 | 16000 | NAMES.CMD | ⟦003bd88d2⟧ |
| 0 | 0 | 22912 | NAMESMOD.CMD | ⟦ea69a1aa9⟧ |
| 0 | 0 | 17536 | NET.CMD | ⟦4f982e6be⟧ |
| 0 | 0 | 17664 | NETDRV.RSP | ⟦6de4aef19⟧ |
| 0 | 0 | 16384 | NETOFF.CMD | ⟦8243b6545⟧ |
| 0 | 0 | 16384 | NETON.CMD | ⟦e8a524556⟧ |
| 0 | 0 | 17920 | NETSTAT.CMD | ⟦c67d05638⟧ |
| 0 | 0 | 38272 | NETVEDL.CMD | ⟦28ea7c0bf⟧ |
| 0 | 0 | 1792 | NIOS.CMD | ⟦ff28041a4⟧ |
| 0 | 0 | 3328 | PIN.RSP | ⟦65c9cbd7d⟧ |
| 0 | 0 | 1152 | R.CMD | ⟦fda426646⟧ |
| 0 | 0 | 128 | RDEF1 | ⟦6ffaa521c⟧ TextFile |
| 0 | 0 | 128 | RDEF4 | ⟦49338253a⟧ TextFile |
| 0 | 0 | 27264 | RNET.CMD | ⟦ac6b840a8⟧ |
| 0 | 0 | 128 | RSDEF1 | ⟦304ce49ff⟧ TextFile |
| 0 | 0 | 128 | RSDEF4 | ⟦7f3f51e99⟧ TextFile |
| 0 | 0 | 33408 | RSNET.CMD | ⟦d9b9ed1a0⟧ |
| 0 | 0 | 7552 | RTM.CON | ⟦ed2a3426e⟧ |
| 0 | 0 | 640 | SCROLL.RSP | ⟦a29593a77⟧ |
| 0 | 0 | 128 | SDEF | ⟦4eb454ef9⟧ TextFile |
| 0 | 0 | 19712 | SNET.CMD | ⟦2d48a0550⟧ |
| 0 | 0 | 21120 | SPL.CMD | ⟦ffcd99468⟧ |
| 0 | 0 | 33664 | SPOOL.CMD | ⟦9eb13831a⟧ |
| 0 | 0 | 256 | STDKONF | ⟦5ddf5f22d⟧ TextFile |
| 0 | 0 | 5632 | SUP.CON | ⟦0997a105a⟧ |
| 0 | 0 | 3328 | SYSDAT.CON | ⟦13f8b41e3⟧ |
| 0 | 0 | 7168 | TMP759.RSP | ⟦f6e807852⟧ |
| 0 | 0 | 2944 | VOUT.RSP | ⟦f665ed891⟧ |
| 0 | 0 | 25472 | XIOS1.CON | ⟦91e0053ed⟧ |
| 0 | 0 | 29056 | XIOS4.CON | ⟦5ad68f681⟧ |
Geometry: [[0, 0, 1], [76, 1, 8]]
First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records
Credible directory tracks:
(2, 0) 0x8000 25-25-25-20-1-1-1-1
(2, 1) 0xa000 1-1-1-1-1-1-1-1
Total credibility: 91
Block number width: ok16
8 290 1 254 210 False
16 0 8 510 0 False
Block Sizes:
2048 0x00 +90 -0
1024 0x00 +11 -79
4096 0x01 +10 -80
8192 0x03 +10 -80
16384 0x07 +10 -80
32768 0x0f +10 -80
65536 0x1f +10 -80
256 0x00 +7 -83
512 0x00 +7 -83
128 0x00 +6 -84
Candidate interleaves in order of directory credibility:
Penalty Name Order Resulting dir order
0 normal-1 (1-2-3-4-5-6-7-8) [24, 24, 24, 19] +114/-0
26 normal-2 (1-3-5-7-2-4-6-8) [24, 24, 0, 0, 24, 19] +97/-20
51 normal-3 (1-4-7-2-5-8-3-6) [24, 19, 0, 24, 0, 0, 24] +103/-16
From the beastiarium: CpmFSCr16 +0/-0
File & label names found:
0x0008000 (2, 0, 1)
ProbeDirEnt {status=0x20, name=»PIC2-2 2-3«, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000a10821010f0a2110}
ProbeDirEnt {status=0x00, name=»ADDNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=080009000a000b000c000d000e000000}
ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x7b, al=0f001000110012001300140015001600}
ProbeDirEnt {status=0x00, name=»CIO CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=17001800190000000000000000000000}
ProbeDirEnt {status=0x00, name=»CLOCK RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=1a000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1b001c001d001e001f00200021002200}
ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x3d, al=23002400250026000000000000000000}
ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2700280029002a002b002c002d002e00}
ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2f003000310032003300340035003600}
ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x43, al=3700380039003a003b00000000000000}
ProbeDirEnt {status=0x00, name=»DRNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=3c003d003e003f004000410042004300}
ProbeDirEnt {status=0x00, name=»DRNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x65, al=4400450046004700480049004a000000}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4b004c004d004e004f00500051005200}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=5300540055005600570058005900eb00}
ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5a005b005c005d005e005f0060006100}
ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=62006300640065006600670068006900}
ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=6a006b006c006d006e006f0070007100}
ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x1b, al=72007300000000000000000000000000}
ProbeDirEnt {status=0x00, name=»GENNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=7400750076007700780079007a000000}
ProbeDirEnt {status=0x00, name=»MEM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=7b007c007d0000000000000000000000}
ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7e007f00800081008200830084008500}
ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x0a, al=86000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8700880089008a008b008c008d008e00}
ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=8f009000910092009300940095009600}
0x0008400 (2, 0, 2)
ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2b, al=97009800990000000000000000000000}
ProbeDirEnt {status=0x00, name=»PIN RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=9a009b00000000000000000000000000}
ProbeDirEnt {status=0x00, name=»R CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=9c000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9d009e009f00a000a100a200a300a400}
ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x55, al=a500a600a700a800a900aa0000000000}
ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ab00ac00ad00ae00af00b000b100b200}
ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=b300b400b500b600b700b800b900ba00}
ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x05, al=bb000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=bc00bd00be00bf00c000c100c200c300}
ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=c400c500c600c700c800c900ca00cb00}
ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=cc00cd00ce00cf00d000d100d200d300}
ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=d400d500d600d700d800d900da00db00}
ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=dc00dd00de00df00e000e100e200e300}
ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x65, al=e400e500e600e700e800e900ea000000}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=ec00ed00ee00ef00f000f100f200f300}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=f400f500f600f700f800f900fa00fb00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=fc00fd00fe00ff000001010102010301}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=0401050106010701080109010a010b01}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=0c010d010e010f011001110112011301}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=1401150116011701180119011a011b01}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x14, al=1c011d01000000000000000000000000}
ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1e011f01200121012201230124012501}
ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=26012701280129012a012b012c012d01}
ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=2e012f01300131013201330134013501}
0x0008800 (2, 0, 3)
ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=36013701380139013a013b013c013d01}
ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=3e013f01400141014201430144014501}
ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=46014701480149014a014b014c014d01}
ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x30, al=4e014f01500100000000000000000000}
ProbeDirEnt {status=0x00, name=»XIOS4 CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=51015201530154015501560157015801}
ProbeDirEnt {status=0x00, name=»XIOS4 CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x63, al=59015a015b015c015d015e015f010000}
ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=60016101620163016401650166016701}
ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=68016901000000000000000000000000}
ProbeDirEnt {status=0x00, name=»SUP CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=6a016b016c0100000000000000000000}
ProbeDirEnt {status=0x00, name=»SYSDAT CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=6d016e01000000000000000000000000}
ProbeDirEnt {status=0x00, name=»VOUT RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x17, al=6f017001000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RTM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=71017201730174010000000000000000}
ProbeDirEnt {status=0x00, name=»TMP759 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x38, al=75017601770178010000000000000000}
ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=79017a017b017c017d017e017f018001}
ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x01, al=81010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»NAMES CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7d, al=82018301840185018601870188018901}
ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8a018b018c018d018e018f0190019101}
ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=92010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»NETON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=93019401950196019701980199019a01}
ProbeDirEnt {status=0x00, name=»SPL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9b019c019d019e019f01a001a101a201}
ProbeDirEnt {status=0x00, name=»SPL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x25, al=a301a401a50100000000000000000000}
ProbeDirEnt {status=0x00, name=»LOCAL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=a601a701a801a901aa01ab0100000000}
ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ac01ad01ae01af01b001b101b201b301}
ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=b4010000000000000000000000000000}
0x0008c00 (2, 0, 4)
ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b501b601b701b801b901ba01bb01bc01}
ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x33, al=bd01be01bf01c0010000000000000000}
ProbeDirEnt {status=0x00, name=»NETOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c101c201c301c401c501c601c701c801}
ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c901ca01cb01cc01cd01ce01cf01d001}
ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=d1010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d201d301d401d501d601d701d801d901}
ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=da01db01dc01dd01de01df01e001e101}
ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x07, al=e2010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»NIOS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=e3010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»DSP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x64, al=e401e501e601e701e801e901ea010000}
ProbeDirEnt {status=0x00, name=»SDEF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=eb010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RDEF4 «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=ec010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RDEF1 «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=ed010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RSDEF4 «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=ee010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RSDEF1 «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=ef010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»XIOS1 CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f001f101f201f301f401f501f601f701}
ProbeDirEnt {status=0x00, name=»XIOS1 CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x47, al=f801f901fa01fb01fc01000000000000}
ProbeDirEnt {status=0x00, name=»STDKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=fd010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»SCROLL RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=fe010000000000000000000000000000}
* 114 - 0 [1, 2, 3, 4, 5, 6, 7, 8]
+ 103 - 16 [1, 4, 7, 2, 5, 8, 3, 6]
+ 97 - 20 [1, 3, 5, 7, 2, 4, 6, 8]