|
DataMuseum.dkPresents historical artifacts from the history of: CP/M |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about CP/M Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metricsIndex: 5 A B C D G I L M N P R S T V X
Length: 1261568 (0x134000) Description: Bits:30004925/disk2.imd SW1400 Piccoline Distributions system 2.3 Description: Bits:30002690 SW1400 Piccoline Distributions system 2.3 - disk 2/3 Types: 5¼" Floppy Disk, CpmFSAuto, ImdContainer Notes: CpmFSAuto_1024_2048_0x0_512_*1+1_2:0_76:1
Media: [0, 0, 1] … [76, 1, 8] {1024: 1232} Signature: CpmFSAuto_1024_2048_0x0_512_*1+1_2:0_76:1 Confidence score: +92/-0 Sector size: 1024 Block size: 2048 Directory entries: 512 Block number size: 16 Extent-mask: 0x00 Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8 Tracks: (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user | bc | length | name | artifact |
---|---|---|---|---|
0 | 0 | 12544 | ADDNET.CMD | ⟦5b727c266⟧ |
0 | 0 | 15744 | BDOS.CON | ⟦2b7751ba8⟧ |
0 | 0 | 123136 | CCPM.SYS | ⟦5c55c9aa1⟧ |
0 | 0 | 95104 | CCPM1.SYS | ⟦2939f7977⟧ |
0 | 0 | 104704 | CCPM4.SYS | ⟦f2cef0761⟧ |
0 | 0 | 5504 | CIO.CON | ⟦4a35b32e1⟧ |
0 | 0 | 640 | CLOCK.RSP | ⟦9b24ff61d⟧ |
0 | 0 | 24192 | CPADDNET.CMD | ⟦2230ef36d⟧ |
0 | 0 | 41344 | CPGENNET.CMD | ⟦32cb584f7⟧ |
0 | 0 | 29312 | DRNET.CMD | ⟦1b662abb8⟧ |
0 | 0 | 12800 | DSP.CMD | ⟦acf6871d9⟧ |
0 | 0 | 52608 | GENCCPM.CMD | ⟦3df3cf8a3⟧ |
0 | 0 | 12544 | GENNET.CMD | ⟦cb9d43b50⟧ |
0 | 0 | 11392 | LOCAL.CMD | ⟦df81e6a32⟧ |
0 | 0 | 16512 | LOGOFF.CMD | ⟦054f6893e⟧ |
0 | 0 | 18432 | LOGON.CMD | ⟦fc0fca4c5⟧ |
0 | 0 | 6144 | MEM.CON | ⟦f63481f50⟧ |
0 | 0 | 16000 | NAMES.CMD | ⟦003bd88d2⟧ |
0 | 0 | 22912 | NAMESMOD.CMD | ⟦ea69a1aa9⟧ |
0 | 0 | 17536 | NET.CMD | ⟦4f982e6be⟧ |
0 | 0 | 17664 | NETDRV.RSP | ⟦6de4aef19⟧ |
0 | 0 | 22784 | NETDRVB.RSP | ⟦8077c95d5⟧ |
0 | 0 | 16384 | NETOFF.CMD | ⟦8243b6545⟧ |
0 | 0 | 16384 | NETON.CMD | ⟦d72580d16⟧ |
0 | 0 | 17920 | NETSTAT.CMD | ⟦c67d05638⟧ |
0 | 0 | 38272 | NETVEDL.CMD | ⟦099ebc038⟧ |
0 | 0 | 1792 | NIOS.CMD | ⟦ff28041a4⟧ |
0 | 0 | 1792 | NIOS1.CMD | ⟦ea6840b62⟧ |
0 | 0 | 3328 | PIN.RSP | ⟦65c9cbd7d⟧ |
0 | 0 | 1152 | R.CMD | ⟦fda426646⟧ |
0 | 0 | 128 | RDEF1 | ⟦6ffaa521c⟧ TextFile |
0 | 0 | 128 | RDEF4 | ⟦49338253a⟧ TextFile |
0 | 0 | 27264 | RNET.CMD | ⟦e40a6f6dd⟧ |
0 | 0 | 128 | RSDEF1 | ⟦304ce49ff⟧ TextFile |
0 | 0 | 128 | RSDEF4 | ⟦7f3f51e99⟧ TextFile |
0 | 0 | 33408 | RSNET.CMD | ⟦f2811c403⟧ |
0 | 0 | 7552 | RTM.CON | ⟦df9f5b33e⟧ |
0 | 0 | 640 | SCROLL.RSP | ⟦a29593a77⟧ |
0 | 0 | 128 | SDEF | ⟦4eb454ef9⟧ TextFile |
0 | 0 | 19712 | SNET.CMD | ⟦0972410b4⟧ |
0 | 0 | 21120 | SPL.CMD | ⟦ffcd99468⟧ |
0 | 0 | 33664 | SPOOL.CMD | ⟦ca47cc2a7⟧ |
0 | 0 | 256 | STDKONF | ⟦5ddf5f22d⟧ TextFile |
0 | 0 | 5632 | SUP.CON | ⟦c310c51f7⟧ |
0 | 0 | 3328 | SYSDAT.CON | ⟦13f8b41e3⟧ |
0 | 0 | 7168 | TMP759.RSP | ⟦87ee6d2ba⟧ |
0 | 0 | 2944 | VOUT.RSP | ⟦f665ed891⟧ |
0 | 0 | 25728 | XIOS1.CON | ⟦6e52c1cac⟧ |
0 | 0 | 29440 | XIOS4.CON | ⟦7ac3a6b99⟧ |
Geometry: [[0, 0, 1], [76, 1, 8]] First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records Credible directory tracks: (2, 0) 0x8000 26-26-26-23-2-2-2-2 (2, 1) 0xa000 2-2-2-2-2-2-2-2 Total credibility: 109 Block number width: ok16 8 296 1 255 216 False 16 0 8 519 0 False Block Sizes: 2048 0x00 +92 -0 1024 0x00 +11 -81 4096 0x01 +11 -81 8192 0x03 +11 -81 16384 0x07 +11 -81 32768 0x0f +11 -81 65536 0x1f +11 -81 256 0x00 +7 -85 512 0x00 +7 -85 128 0x00 +6 -86 Candidate interleaves in order of directory credibility: Penalty Name Order Resulting dir order 0 normal-1 (1-2-3-4-5-6-7-8) [25, 25, 25, 22, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +92/-0 24 normal-2 (1-3-5-7-2-4-6-8) [25, 25, 1, 1, 25, 22, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1] +92/-21 48 normal-3 (1-4-7-2-5-8-3-6) [25, 22, 1, 25, 1, 1, 25, 1, 1, 1, 1, 1, 1, 1, 1, 1] +92/-18 From the beastiarium: CpmFSCr16 +0/-0 File & label names found: 0x0008000 (2, 0, 1) ProbeDirEnt {status=0x20, name=»PIC 2-3.2-3«, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000520a1106520a1106} ProbeDirEnt {status=0x00, name=»ADDNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=080009000a000b000c000d000e000000} ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x7b, al=0f001000110012001300140015001600} ProbeDirEnt {status=0x00, name=»CIO CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=17001800190000000000000000000000} ProbeDirEnt {status=0x00, name=»CLOCK RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=1a000000000000000000000000000000} ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1b001c001d001e001f00200021002200} ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x3d, al=23002400250026000000000000000000} ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2700280029002a002b002c002d002e00} ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2f003000310032003300340035003600} ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x43, al=3700380039003a003b00000000000000} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=3c003d003e003f004000410042004300} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=4400450046004700480049004a004b00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=4c004d004e004f005000510052005300} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=5400550056005700580059005a005b00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=5c005d005e005f006000610062006300} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=6400650066006700680069006a006b00} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=6c006d006e006f007000710072007300} ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x42, al=74007500760077007800000000000000} ProbeDirEnt {status=0x00, name=»XIOS4 CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=79007a007b007c007d007e007f008000} ProbeDirEnt {status=0x00, name=»XIOS4 CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x66, al=81008200830084008500860087000000} ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=880089008a008b008c008d008e008f00} ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=90009100920093009400950096009700} ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=980099009a009b009c009d009e009f00} ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=a000a100a200a300a400a500a600a700} 0x0008400 (2, 0, 2) ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=a800a900aa00ab00ac00ad00ae00af00} ProbeDirEnt {status=0x00, name=»CCPM1 SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x67, al=b000b100b200b300b400b500b6000000} ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b700b800b900ba00bb00bc00bd00be00} ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=bf00c000c100c200c300c400c500c600} ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=c700c800c900ca00cb00cc00cd00ce00} ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=cf00d000d100d200d300d400d500d600} ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=d700d800d900da00db00dc00dd00de00} ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=df00e000e100e200e300e400e500e600} ProbeDirEnt {status=0x00, name=»CCPM4 SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x32, al=e700e800e900ea000000000000000000} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=eb00ec00ed00ee00ef00f000f100f200} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f300f400f500f600f700f800f900fa00} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=fb00fc00fd00fe00ff00000101010201} ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x1b, al=03010401000000000000000000000000} ProbeDirEnt {status=0x00, name=»GENNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=050106010701080109010a010b010000} ProbeDirEnt {status=0x00, name=»MEM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=0c010d010e0100000000000000000000} ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0f011001110112011301140115011601} ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x0a, al=17010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»DRNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=180119011a011b011c011d011e011f01} ProbeDirEnt {status=0x00, name=»DRNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x65, al=20012101220123012401250126010000} ProbeDirEnt {status=0x00, name=»PIN RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=27012801000000000000000000000000} ProbeDirEnt {status=0x00, name=»R CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=29010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2a012b012c012d012e012f0130013101} ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x55, al=32013301340135013601370100000000} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=380139013a013b013c013d013e013f01} 0x0008800 (2, 0, 3) ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=40014101420143014401450146014701} ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x05, al=48010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»TMP759 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x38, al=49014a014b014c010000000000000000} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4d014e014f0150015101520153015401} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=550156015701580159015a015b015c01} ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2b, al=5d015e015f0100000000000000000000} ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=60016101620163016401650166016701} ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=68016901000000000000000000000000} ProbeDirEnt {status=0x00, name=»SUP CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=6a016b016c0100000000000000000000} ProbeDirEnt {status=0x00, name=»SYSDAT CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=6d016e01000000000000000000000000} ProbeDirEnt {status=0x00, name=»VOUT RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x17, al=6f017001000000000000000000000000} ProbeDirEnt {status=0x00, name=»RTM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=71017201730174010000000000000000} ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=750176017701780179017a017b017c01} ProbeDirEnt {status=0x00, name=»LOGOFF CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x01, al=7d010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NAMES CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7d, al=7e017f01800181018201830184018501} ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=86018701880189018a018b018c018d01} ProbeDirEnt {status=0x00, name=»NET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=8e010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NETON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8f019001910192019301940195019601} ProbeDirEnt {status=0x00, name=»SPL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9701980199019a019b019c019d019e01} ProbeDirEnt {status=0x00, name=»SPL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x25, al=9f01a001a10100000000000000000000} ProbeDirEnt {status=0x00, name=»LOCAL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=a201a301a401a501a601a70100000000} ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a801a901aa01ab01ac01ad01ae01af01} ProbeDirEnt {status=0x00, name=»LOGON CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=b0010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b101b201b301b401b501b601b701b801} 0x0008c00 (2, 0, 4) ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x33, al=b901ba01bb01bc010000000000000000} ProbeDirEnt {status=0x00, name=»NETOFF CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=bd01be01bf01c001c101c201c301c401} ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c501c601c701c801c901ca01cb01cc01} ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=cd010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ce01cf01d001d101d201d301d401d501} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d601d701d801d901da01db01dc01dd01} ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x07, al=de010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NIOS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=df010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»DSP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x64, al=e001e101e201e301e401e501e6010000} ProbeDirEnt {status=0x00, name=»SDEF «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=e7010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RDEF4 «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=e8010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RDEF1 «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=e9010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RSDEF4 «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=ea010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»RSDEF1 «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=eb010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»STDKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=ec010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»SCROLL RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=ed010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ee01ef01f001f101f201f301f401f501} ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x32, al=f601f701f801f9010000000000000000} ProbeDirEnt {status=0x00, name=»NIOS1 CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=fa010000000000000000000000000000} ProbeDirEnt {status=0x00, name=»XIOS1 CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=fb01fc01fd01fe01ff01000201020202} ProbeDirEnt {status=0x00, name=»XIOS1 CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x49, al=03020402050206020702000000000000} 0x0009000 (2, 0, 5) 0x0009400 (2, 0, 6) 0x0009800 (2, 0, 7) 0x0009c00 (2, 0, 8) 0x000a000 (2, 1, 1) 0x000a400 (2, 1, 2) 0x000a800 (2, 1, 3) 0x000ac00 (2, 1, 4) 0x000b000 (2, 1, 5) 0x000b400 (2, 1, 6) 0x000b800 (2, 1, 7) 0x000bc00 (2, 1, 8) + 92 - 0 <Tree 0x0-0x9a000-0x134000> + 92 - 18 <Tree 0x0-0x9a000-0x134000>