|
|
DataMuseum.dkPresents historical artifacts from the history of: CP/M |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about CP/M Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metricsIndex: 5 B C G L M N P R S T X
Length: 1261568 (0x134000)
Description: Bits:30002785 SW1500 Concurrent DOS SYSTEM DISKETTE 4.2 - disk 2/3
Types: 5¼" Floppy Disk, CpmFSAuto
Notes: CP/M-fs(1024_2048_0x0_*1+1_2:0_76:1_128)
Media: [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature: 1024_2048_0x0_*1+1_2:0_76:1_128
Confidence score: +119/-0
Sector size: 1024
Block size: 2048
Directory entries: 128
Block number size: 16
Extent-mask: 0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks: (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
| user | bc | length | name | artifact |
|---|---|---|---|---|
| 0 | 0 | 23424 | BDOS.CON | ⟦ad8bb84b7⟧ |
| 0 | 0 | 41984 | BESKED.CMD | ⟦710669035⟧ |
| 0 | 0 | 214400 | CCPM.SYS | ⟦e31eae776⟧ |
| 0 | 0 | 6016 | CIO.CON | ⟦028cad1c9⟧ |
| 0 | 0 | 640 | CLOCK.RSP | ⟦47fd682bf⟧ |
| 0 | 0 | 49536 | GENCCPM.CMD | ⟦d42cf4f41⟧ |
| 0 | 0 | 256 | GENINST.SUB | ⟦4ec9be81f⟧ TextFile |
| 0 | 0 | 39424 | LANREL.CMD | ⟦ebd7ff393⟧ |
| 0 | 0 | 39680 | MATREL.CMD | ⟦b25b5c439⟧ |
| 0 | 0 | 19712 | MATRELHW.CMD | ⟦1338cc08b⟧ |
| 0 | 0 | 19712 | MATRELSW.CMD | ⟦653eb29cf⟧ |
| 0 | 0 | 6144 | MEM.CON | ⟦4cfb035ee⟧ |
| 0 | 0 | 1792 | MINTERN.CMD | ⟦6f10a2e4e⟧ |
| 0 | 0 | 23680 | NETDRV.RSP | ⟦fada983a3⟧ |
| 0 | 0 | 256 | NETKONF | ⟦f1fb01cb5⟧ TextFile |
| 0 | 0 | 51968 | NETVEDL.CMD | ⟦a8f127868⟧ |
| 0 | 0 | 3200 | PIN750.RSP | ⟦65a6ea281⟧ |
| 0 | 0 | 17280 | PINTERN.CMD | ⟦3100e53f9⟧ |
| 0 | 0 | 37888 | POSTHUS.CMD | ⟦8a3a813a2⟧ |
| 0 | 0 | 35200 | RCADDNET.CMD | ⟦21f720976⟧ |
| 0 | 0 | 5120 | RCDSP.CMD | ⟦b95b71ff5⟧ |
| 0 | 0 | 46848 | RCGENNET.CMD | ⟦d18d97312⟧ |
| 0 | 0 | 1920 | RCNIOS.CMD | ⟦1a810ffb0⟧ |
| 0 | 0 | 16384 | RCSPL.CMD | ⟦60f369d2a⟧ |
| 0 | 0 | 3072 | REMOTE.CMD | ⟦6a294b3bd⟧ |
| 0 | 0 | 33280 | REMTMP.RSP | ⟦9f125c73a⟧ |
| 0 | 0 | 31744 | RNET.CMD | ⟦fc5e67dae⟧ |
| 0 | 0 | 38528 | RSNET.CMD | ⟦fcab94e27⟧ |
| 0 | 0 | 7680 | RTM.CON | ⟦63b8d3445⟧ |
| 0 | 0 | 640 | SCROLL.RSP | ⟦27844af8c⟧ |
| 0 | 0 | 39680 | SIOREL.CMD | ⟦8dd96606b⟧ |
| 0 | 0 | 20736 | SNET.CMD | ⟦831a06dce⟧ |
| 0 | 0 | 42240 | SPOOL.CMD | ⟦ff889c8d1⟧ |
| 0 | 0 | 256 | STDKONF | ⟦c91424c2d⟧ TextFile |
| 0 | 0 | 39808 | STRREL.CMD | ⟦674fbb778⟧ |
| 0 | 0 | 8960 | SUP.CON | ⟦87adeefee⟧ |
| 0 | 0 | 3456 | SYSDAT.CON | ⟦0644b0037⟧ |
| 0 | 0 | 50560 | SYSVEDL.CMD | ⟦5af240ab0⟧ |
| 0 | 0 | 33152 | TMP750.RSP | ⟦6e964a4f6⟧ |
| 0 | 0 | 44544 | XIOS.CON | ⟦a6cee416e⟧ |
Geometry: [[0, 0, 1], [76, 1, 8]]
First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records
Credible directory tracks:
(2, 0) 0x8000 25-25-25-25-1-1-1-1
(2, 1) 0xa000 1-1-1-1-1-1-1-1
Total credibility: 96
Block number width: ok16
8 399 1 255 207 False
16 0 8 564 0 False
Block Sizes:
2048 0x00 +95 -0
1024 0x00 +9 -86
4096 0x01 +7 -88
8192 0x03 +7 -88
16384 0x07 +7 -88
32768 0x0f +7 -88
65536 0x1f +7 -88
512 0x00 +6 -89
256 0x00 +3 -92
128 0x00 +0 -95
Candidate interleaves in order of directory credibility:
Penalty Name Order Resulting dir order
0 normal-1 (1-2-3-4-5-6-7-8) [24, 24, 24, 24] +119/-0
26 normal-2 (1-3-5-7-2-4-6-8) [24, 24, 0, 0, 24, 24] +100/-0
51 normal-3 (1-4-7-2-5-8-3-6) [24, 24, 0, 24, 0, 0, 24] +112/-0
From the beastiarium: CpmFSCr16 +0/-0
File & label names found:
0x0008000 (2, 0, 1)
ProbeDirEnt {status=0x20, name=» «, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000350c1401350c1401}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=10001100120013001400150016001700}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=180019001a001b001c001d001e001f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=20002100220023002400250026002700}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=30003100320033003400350036003700}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=380039003a003b003c003d003e003f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=40004100420043004400450046004700}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=480049004a004b004c004d004e004f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=50005100520053005400550056005700}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0a, bc=0x00, xh=0x00, rc=0x80, al=580059005a005b005c005d005e005f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0b, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0c, bc=0x00, xh=0x00, rc=0x80, al=680069006a006b006c006d006e006f00}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0d, bc=0x00, xh=0x00, rc=0x0b, al=70000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»GENINST SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=71000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=72007300740075007600770078007900}
ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=7a007b007c007d007e007f0080008100}
ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=82008300840085008600870088008900}
ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x03, al=8a000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»NETKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=8b000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»STDKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=8c000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8d008e008f0090009100920093009400}
ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x37, al=95009600970098000000000000000000}
0x0008400 (2, 0, 2)
ProbeDirEnt {status=0x00, name=»CIO CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2f, al=99009a009b0000000000000000000000}
ProbeDirEnt {status=0x00, name=»MEM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=9c009d009e0000000000000000000000}
ProbeDirEnt {status=0x00, name=»RTM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=9f00a000a100a2000000000000000000}
ProbeDirEnt {status=0x00, name=»SUP CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x46, al=a300a400a500a600a700000000000000}
ProbeDirEnt {status=0x00, name=»SYSDAT CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1b, al=a800a900000000000000000000000000}
ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=aa00ab00ac00ad00ae00af00b000b100}
ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=b200b300b400b500b600b700b800b900}
ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x5c, al=ba00bb00bc00bd00be00bf0000000000}
ProbeDirEnt {status=0x00, name=»CLOCK RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=c0000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c100c200c300c400c500c600c700c800}
ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x39, al=c900ca00cb00cc000000000000000000}
ProbeDirEnt {status=0x00, name=»PIN750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=cd00ce00000000000000000000000000}
ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=cf00d000d100d200d300d400d500d600}
ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d700d800d900da00db00dc00dd00de00}
ProbeDirEnt {status=0x00, name=»REMTMP RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x04, al=df000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»SCROLL RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=e0000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=e100e200e300e400e500e600e700e800}
ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=e900ea00eb00ec00ed00ee00ef00f000}
ProbeDirEnt {status=0x00, name=»TMP750 RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x03, al=f1000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f200f300f400f500f600f700f800f900}
ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=fa00fb00fc00fd00fe00ff0000010101}
ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=02010301040105010601070108010901}
ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x16, al=0a010b01000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0c010d010e010f011001110112011301}
0x0008800 (2, 0, 3)
ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=1401150116011701180119011a011b01}
ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x6e, al=1c011d011e011f012001210122010000}
ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=23012401250126012701280129012a01}
ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2b012c012d012e012f01300131013201}
ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x13, al=33013401000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RCNIOS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=35010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=36013701380139013a013b013c013d01}
ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x78, al=3e013f01400141014201430144014501}
ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=46014701480149014a014b014c014d01}
ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=4e014f01500151015201530154015501}
ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2d, al=56015701580100000000000000000000}
ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=59015a015b015c015d015e015f016001}
ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x22, al=61016201630100000000000000000000}
ProbeDirEnt {status=0x00, name=»REMOTE CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=64016501000000000000000000000000}
ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=66016701680169016a016b016c016d01}
ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=6e016f01700171017201730174017501}
ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x4a, al=76017701780179017a01000000000000}
ProbeDirEnt {status=0x00, name=»RCDSP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x28, al=7b017c017d0100000000000000000000}
ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7e017f01800181018201830184018501}
ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=86018701880189018a018b018c018d01}
ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=8e018f01900191019201930194019501}
ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x34, al=96019701980199010000000000000000}
ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9a019b019c019d019e019f01a001a101}
ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=a201a301a401a501a601a701a801a901}
0x0008c00 (2, 0, 4)
ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=aa01ab01ac01ad010000000000000000}
ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ae01af01b001b101b201b301b401b501}
ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=b601b701000000000000000000000000}
ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b801b901ba01bb01bc01bd01be01bf01}
ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=c001c101000000000000000000000000}
ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c201c301c401c501c601c701c801c901}
ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=ca01cb01cc01cd01ce01cf01d001d101}
ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=d201d301d401d5010000000000000000}
ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d601d701d801d901da01db01dc01dd01}
ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=de01df01e001e101e201e301e401e501}
ProbeDirEnt {status=0x00, name=»STRREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x37, al=e601e701e801e9010000000000000000}
ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ea01eb01ec01ed01ee01ef01f001f101}
ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f201f301f401f501f601f701f801f901}
ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=fa01fb01fc01fd01fe01ff0100020102}
ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x0b, al=02020000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=03020402050206020702080209020a02}
ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=0b020c020d020e020f02100211021202}
ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x28, al=13021402150200000000000000000000}
ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=16021702180219021a021b021c021d02}
ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=1e021f02200221022202230224022502}
ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=26022702280229022a02000000000000}
ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2b022c022d022e022f02300231023202}
ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x07, al=33020000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»MINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=34020000000000000000000000000000}
* 119 - 0 [1, 2, 3, 4, 5, 6, 7, 8]
+ 112 - 0 [1, 4, 7, 2, 5, 8, 3, 6]
+ 100 - 0 [1, 3, 5, 7, 2, 4, 6, 8]