|
|
DataMuseum.dkPresents historical artifacts from the history of: CP/M |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about CP/M Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metricsIndex: 5 B C F G L M N P R S T X
Length: 1261568 (0x134000)
Description: Bits:30002697 SW1458 Concurrent DOS Distributionsdiskette 4.0 - disk 2/3
Types: 5¼" Floppy Disk, CpmFSAuto
Notes: CP/M-fs(1024_2048_0x0_*1+1_2:0_76:1_128)
Media: [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature: 1024_2048_0x0_*1+1_2:0_76:1_128
Confidence score: +117/-0
Sector size: 1024
Block size: 2048
Directory entries: 128
Block number size: 16
Extent-mask: 0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks: (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
| user | bc | length | name | artifact |
|---|---|---|---|---|
| 0 | 0 | 23424 | BDOS.CON | ⟦502ba11a7⟧ |
| 0 | 0 | 41984 | BESKED.CMD | ⟦3963f17aa⟧ |
| 0 | 0 | 209664 | CCPM.SYS | ⟦be390f6a5⟧ |
| 0 | 0 | 6016 | CIO.CON | ⟦cc126d9ca⟧ |
| 0 | 0 | 640 | CLOCK.RSP | ⟦47fd682bf⟧ |
| 0 | 0 | 21632 | FILEX.A86 | ⟦c864451fd⟧ TextFile |
| 0 | 0 | 2688 | FILEX.CMD | ⟦ceed655ff⟧ |
| 0 | 0 | 49536 | GENCCPM.CMD | ⟦222ee6c26⟧ |
| 0 | 0 | 256 | GENINST.SUB | ⟦4ec9be81f⟧ TextFile |
| 0 | 0 | 39296 | LANREL.CMD | ⟦bd5157903⟧ |
| 0 | 0 | 39680 | MATREL.CMD | ⟦e70e8d2d3⟧ |
| 0 | 0 | 18560 | MATRELHW.CMD | ⟦d994f55f8⟧ |
| 0 | 0 | 19712 | MATRELSW.CMD | ⟦21b904476⟧ |
| 0 | 0 | 6144 | MEM.CON | ⟦ee4fd466d⟧ |
| 0 | 0 | 1792 | MINTERN.CMD | ⟦6f10a2e4e⟧ |
| 0 | 0 | 9088 | MODEM.CMD | ⟦7f98d6ad4⟧ |
| 0 | 0 | 1408 | MODEM.KAT | ⟦d4b0a6556⟧ |
| 0 | 0 | 23680 | NETDRV.RSP | ⟦fada983a3⟧ |
| 0 | 0 | 256 | NETKONF | ⟦48677865a⟧ TextFile |
| 0 | 0 | 51968 | NETVEDL.CMD | ⟦0cad93b6e⟧ |
| 0 | 0 | 3200 | PIN759.RSP | ⟦65a6ea281⟧ |
| 0 | 0 | 17280 | PINTERN.CMD | ⟦3100e53f9⟧ |
| 0 | 0 | 9344 | PIP.CMD | ⟦307e4cf3c⟧ |
| 0 | 0 | 37888 | POSTHUS.CMD | ⟦9e65eb2a4⟧ |
| 0 | 0 | 32768 | RCADDNET.CMD | ⟦e45eff9f8⟧ |
| 0 | 0 | 5120 | RCDSP.CMD | ⟦b95b71ff5⟧ |
| 0 | 0 | 46848 | RCGENNET.CMD | ⟦1abce0bc8⟧ |
| 0 | 0 | 1920 | RCNIOS.CMD | ⟦1a810ffb0⟧ |
| 0 | 0 | 16384 | RCSPL.CMD | ⟦60f369d2a⟧ |
| 0 | 0 | 31744 | RNET.CMD | ⟦7222caa28⟧ |
| 0 | 0 | 38528 | RSNET.CMD | ⟦f3a2f1b76⟧ |
| 0 | 0 | 7680 | RTM.CON | ⟦24a9f75b8⟧ |
| 0 | 0 | 640 | SCROLL.RSP | ⟦f3378549e⟧ |
| 0 | 0 | 38528 | SIOREL.CMD | ⟦bcf4754e5⟧ |
| 0 | 0 | 20736 | SNET.CMD | ⟦b68a23120⟧ |
| 0 | 0 | 42240 | SPOOL.CMD | ⟦159e8616b⟧ |
| 0 | 0 | 256 | STDKONF | ⟦622ecd79f⟧ TextFile |
| 0 | 0 | 3584 | SUBMIT.CMD | ⟦3ece11c64⟧ |
| 0 | 0 | 8960 | SUP.CON | ⟦83023b077⟧ |
| 0 | 0 | 3456 | SYSDAT.CON | ⟦9090bd8b1⟧ |
| 0 | 0 | 49024 | SYSVEDL.CMD | ⟦c17db3bac⟧ |
| 0 | 0 | 33152 | TMP759.RSP | ⟦34d6db8e1⟧ |
| 0 | 0 | 41088 | XIOS.CON | ⟦4156075d0⟧ |
Geometry: [[0, 0, 1], [76, 1, 8]]
First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records
Credible directory tracks:
(2, 0) 0x8000 25-25-25-22-1-1-1-1
(2, 1) 0xa000 1-1-1-1-1-1-1-1
Total credibility: 93
Block number width: ok16
8 363 1 255 207 False
16 0 8 544 0 False
Block Sizes:
2048 0x00 +92 -0
1024 0x00 +8 -84
4096 0x01 +8 -84
8192 0x03 +8 -84
16384 0x07 +8 -84
32768 0x0f +8 -84
65536 0x1f +8 -84
512 0x00 +5 -87
256 0x00 +3 -89
128 0x00 +0 -92
Candidate interleaves in order of directory credibility:
Penalty Name Order Resulting dir order
0 normal-1 (1-2-3-4-5-6-7-8) [24, 24, 24, 21] +117/-0
26 normal-2 (1-3-5-7-2-4-6-8) [24, 24, 0, 0, 24, 21] +95/-19
51 normal-3 (1-4-7-2-5-8-3-6) [24, 21, 0, 24, 0, 0, 24] +100/-19
From the beastiarium: CpmFSCr16 +0/-0
File & label names found:
0x0008000 (2, 0, 1)
ProbeDirEnt {status=0x20, name=»Rel4-0 D2/3«, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000000d1507000d1507}
ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00}
ProbeDirEnt {status=0x00, name=»BDOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x37, al=10001100120013000000000000000000}
ProbeDirEnt {status=0x00, name=»CIO CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2f, al=14001500160000000000000000000000}
ProbeDirEnt {status=0x00, name=»MEM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=17001800190000000000000000000000}
ProbeDirEnt {status=0x00, name=»RTM CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=1a001b001c001d000000000000000000}
ProbeDirEnt {status=0x00, name=»SUP CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x46, al=1e001f00200021002200000000000000}
ProbeDirEnt {status=0x00, name=»SYSDAT CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1b, al=23002400000000000000000000000000}
ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=250026002700280029002a002b002c00}
ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2d002e002f0030003100320033003400}
ProbeDirEnt {status=0x00, name=»XIOS CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x41, al=35003600370038003900000000000000}
ProbeDirEnt {status=0x00, name=»CLOCK RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=3a000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=3b003c003d003e003f00400041004200}
ProbeDirEnt {status=0x00, name=»NETDRV RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x39, al=43004400450046000000000000000000}
ProbeDirEnt {status=0x00, name=»PIN759 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=47004800000000000000000000000000}
ProbeDirEnt {status=0x00, name=»TMP759 RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=49004a004b004c004d004e004f005000}
ProbeDirEnt {status=0x00, name=»TMP759 RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=51005200530054005500560057005800}
ProbeDirEnt {status=0x00, name=»TMP759 RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x03, al=59000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»SCROLL RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=5a000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5b005c005d005e005f00600061006200}
ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=63006400650066006700680069006a00}
ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x28, al=6b006c006d0000000000000000000000}
ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=6e006f00700071007200730074007500}
ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=76007700780079007a007b007c007d00}
0x0008400 (2, 0, 2)
ProbeDirEnt {status=0x00, name=»BESKED CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=7e007f00800081008200000000000000}
ProbeDirEnt {status=0x00, name=»MINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=83000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8400850086008700880089008a008b00}
ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x07, al=8c000000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8d008e008f0090009100920093009400}
ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=950096009700980099009a009b009c00}
ProbeDirEnt {status=0x00, name=»SPOOL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x4a, al=9d009e009f00a000a100000000000000}
ProbeDirEnt {status=0x00, name=»RCDSP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x28, al=a200a300a40000000000000000000000}
ProbeDirEnt {status=0x00, name=»RCSPL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a500a600a700a800a900aa00ab00ac00}
ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ad00ae00af00b000b100b200b300b400}
ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=b500b600b700b800b900ba00bb00bc00}
ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=bd00be00bf00c000c100c200c300c400}
ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x16, al=c500c600000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c700c800c900ca00cb00cc00cd00ce00}
ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=cf00d000d100d200d300d400d500d600}
ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x6e, al=d700d800d900da00db00dc00dd000000}
ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=de00df00e000e100e200e300e400e500}
ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=e600e700e800e900ea00eb00ec00ed00}
ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ee00ef00f000f100f200f300f400f500}
ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f600f700f800f900fa00fb00fc00fd00}
ProbeDirEnt {status=0x00, name=»SIOREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2d, al=fe00ff00000100000000000000000000}
ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=01010201030104010501060107010801}
ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=09010a010b010c010d010e010f011001}
ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x7f, al=11011201130114011501160117011801}
0x0008800 (2, 0, 3)
ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=19011a011b011c011d011e011f012001}
ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=21012201230124012501260127012801}
ProbeDirEnt {status=0x00, name=»MATREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=29012a012b012c010000000000000000}
ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2d012e012f0130013101320133013401}
ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=350136013701380139013a013b013c01}
ProbeDirEnt {status=0x00, name=»LANREL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x33, al=3d013e013f0140010000000000000000}
ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=41014201430144014501460147014801}
ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=49014a01000000000000000000000000}
ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4b014c014d014e014f01500151015201}
ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=53015401000000000000000000000000}
ProbeDirEnt {status=0x00, name=»MODEM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x47, al=55015601570158015901000000000000}
ProbeDirEnt {status=0x00, name=»MODEM KAT«, xl=0x00, bc=0x00, xh=0x00, rc=0x0b, al=5a010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5b015c015d015e015f01600161016201}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=63016401650166016701680169016a01}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=6b016c016d016e016f01700171017201}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=73017401750176017701780179017a01}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=7b017c017d017e017f01800181018201}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=83018401850186018701880189018a01}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=8b018c018d018e018f01900191019201}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=93019401950196019701980199019a01}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=9b019c019d019e019f01a001a101a201}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=a301a401a501a601a701a801a901aa01}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0a, bc=0x00, xh=0x00, rc=0x80, al=ab01ac01ad01ae01af01b001b101b201}
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0b, bc=0x00, xh=0x00, rc=0x80, al=b301b401b501b601b701b801b901ba01}
0x0008c00 (2, 0, 4)
ProbeDirEnt {status=0x00, name=»CCPM SYS«, xl=0x0c, bc=0x00, xh=0x00, rc=0x66, al=bb01bc01bd01be01bf01c001c1010000}
ProbeDirEnt {status=0x00, name=»FILEX A86«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c201c301c401c501c601c701c801c901}
ProbeDirEnt {status=0x00, name=»FILEX A86«, xl=0x01, bc=0x00, xh=0x00, rc=0x29, al=ca01cb01cc0100000000000000000000}
ProbeDirEnt {status=0x00, name=»FILEX CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x15, al=cd01ce01000000000000000000000000}
ProbeDirEnt {status=0x00, name=»STDKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=cf010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»NETKONF «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=d0010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»GENINST SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=d1010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d201d301d401d501d601d701d801d901}
ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=da01db01dc01dd01de01df01e001e101}
ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=e201e301e401e501e601e701e801e901}
ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x03, al=ea010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»PIP CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x49, al=eb01ec01ed01ee01ef01000000000000}
ProbeDirEnt {status=0x00, name=»RCNIOS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=f0010000000000000000000000000000}
ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f101f201f301f401f501f601f701f801}
ProbeDirEnt {status=0x00, name=»RNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x78, al=f901fa01fb01fc01fd01fe01ff010002}
ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=01020202030204020502060207020802}
ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=09020a020b020c020d020e020f021002}
ProbeDirEnt {status=0x00, name=»RSNET CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2d, al=11021202130200000000000000000000}
ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1402150216021702180219021a021b02}
ProbeDirEnt {status=0x00, name=»SNET CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x22, al=1c021d021e0200000000000000000000}
ProbeDirEnt {status=0x00, name=»SUBMIT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x1c, al=1f022002000000000000000000000000}
* 117 - 0 [1, 2, 3, 4, 5, 6, 7, 8]
+ 100 - 19 [1, 4, 7, 2, 5, 8, 3, 6]
+ 95 - 19 [1, 3, 5, 7, 2, 4, 6, 8]