DataMuseum.dk

Presents historical artifacts from the history of:

RegneCentralen RC759 "Piccoline"

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about RegneCentralen RC759 "Piccoline"

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics
Index: 5 B C D E H I L M N P R S T

⟦4baf55c20⟧ Bits:30002698 SW1458 Concurrent DOS Distributionsdiskette 4.0 - disk 3/3, 5¼" Floppy Disk, CpmFSAuto

    Length: 1261568 (0x134000)
    Description: Bits:30002698 SW1458 Concurrent DOS Distributionsdiskette 4.0 - disk 3/3
    Types: 5¼" Floppy Disk, CpmFSAuto
    Notes: CP/M-fs(1024_2048_0x0_*1+1_2:0_76:1_64)

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         1024_2048_0x0_*1+1_2:0_76:1_64
Confidence score:  +73/-0 
Sector size:       1024
Block size:        2048
Directory entries: 64
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0010240BATCH.CMD⟦e84432333⟧
002432CHDIR.CMD⟦0771f485e⟧
0021760CHSET.CMD⟦cc23f3506⟧
0028672COPY.EXE⟦ce0fea643⟧
002560DATE.EXE⟦2080dfd02⟧
002432ERA.CMD⟦b5aa7b2b4⟧
003968ERAQ.CMD⟦9bf09a951⟧
001536ERASE.EXE⟦bbe6d8278⟧
007680HELP.CMD⟦d04a59695⟧
0041984HELP.HLP⟦ab2121918⟧
0036992INITDIR.CMD⟦e8b36210b⟧
0011392LOCAL.CMD⟦e9ff9621a⟧
0016384LOGOFF.CMD⟦91086fa6f⟧
0018304LOGON.CMD⟦cf5809350⟧
002304MKDIR.CMD⟦44cba90dc⟧
0015872NAMES.CMD⟦d8b762cc7⟧
0022784NAMESMOD.CMD⟦0db2a04fd⟧
0017536NET.CMD⟦8f8da0d3e⟧
0016256NETOFF.CMD⟦6680e30d8⟧
0016384NETON.CMD⟦76809c5d0⟧
0017920NETSTAT.CMD⟦724e13c09⟧
002560PATH.EXE⟦e69ce8108⟧
009344PIP.CMD⟦307e4cf3c⟧
002048REN.EXE⟦3436dd0ad⟧
002176RMDIR.CMD⟦6bf6a5b4d⟧
0013312SDIR.CMD⟦2c55b56fd⟧
007680SET.CMD⟦9e739eed3⟧
007424SHOW.CMD⟦5c9f52c24⟧
007168STOP.CMD⟦2c52e6669⟧
002304SYSDISK.CMD⟦14720b360⟧
002048TIME.EXE⟦16052ed4f⟧
002048TYPE.CMD⟦fe7495fa8⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 8]]

First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x8000 25-20-1-1-1-1-1-1
   (2, 1)  0xa000 1-1-1-1-1-1-1-1

Total credibility: 43

Block number width: ok16

   8     0     8   202   153  False
  16     0     8   202     0  False

Block Sizes:
    2048 0x00 +42 -0
    4096 0x01 +4 -38
    8192 0x03 +4 -38
   16384 0x07 +4 -38
   32768 0x0f +4 -38
   65536 0x1f +4 -38
     128 0x00 +0 -42
     256 0x00 +0 -42
     512 0x00 +0 -42
    1024 0x00 +0 -42

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5-6-7-8)                                                         [24, 19]   +73/-0
     21  normal-3     (1-4-7-2-5-8-3-6)                                                         [24, 0, 0, 19]   +61/-12
     22  normal-2     (1-3-5-7-2-4-6-8)                                                         [24, 0, 0, 0, 19]   +50/-10
From the beastiarium: CpmFSCr16   +0/-0
From the beastiarium: CpmFSJames   +0/-0

File & label names found:
  0x0008000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»Rel4-0 D3/3«, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000010d1345010d1345}
    ProbeDirEnt {status=0x00, name=»HELP    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=080009000a000b000000000000000000}
    ProbeDirEnt {status=0x00, name=»HELP    HLP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0c000d000e000f001000110012001300}
    ProbeDirEnt {status=0x00, name=»HELP    HLP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=1400150016001700180019001a001b00}
    ProbeDirEnt {status=0x00, name=»HELP    HLP«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=1c001d001e001f002000000000000000}
    ProbeDirEnt {status=0x00, name=»SET     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=21002200230024000000000000000000}
    ProbeDirEnt {status=0x00, name=»STOP    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x38, al=25002600270028000000000000000000}
    ProbeDirEnt {status=0x00, name=»ERAQ    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x1f, al=29002a00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»ERA     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x13, al=2b002c00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SDIR    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x68, al=2d002e002f0030003100320033000000}
    ProbeDirEnt {status=0x00, name=»SHOW    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=34003500360037000000000000000000}
    ProbeDirEnt {status=0x00, name=»PATH    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x14, al=38003900000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»BATCH   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x50, al=3a003b003c003d003e00000000000000}
    ProbeDirEnt {status=0x00, name=»CHDIR   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x13, al=3f004000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»COPY    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=41004200430044004500460047004800}
    ProbeDirEnt {status=0x00, name=»COPY    EXE«, xl=0x01, bc=0x00, xh=0x00, rc=0x60, al=49004a004b004c004d004e0000000000}
    ProbeDirEnt {status=0x00, name=»DATE    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x14, al=4f005000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»ERASE   EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x0c, al=51000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MKDIR   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x12, al=52005300000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PIP     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x49, al=54005500560057005800000000000000}
    ProbeDirEnt {status=0x00, name=»RMDIR   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x11, al=59005a00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»REN     EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=5b000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SYSDISK CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x12, al=5c005d00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TIME    EXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=5e000000000000000000000000000000}
  0x0008400 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»TYPE    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=5f000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CHSET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=60006100620063006400650066006700}
    ProbeDirEnt {status=0x00, name=»CHSET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x2a, al=680069006a0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=6b006c006d006e006f00700071007200}
    ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=73007400750076007700780079007a00}
    ProbeDirEnt {status=0x00, name=»INITDIR CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x21, al=7b007c007d0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7e007f00800081008200830084008500}
    ProbeDirEnt {status=0x00, name=»NETOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7f, al=86008700880089008a008b008c008d00}
    ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8e008f00900091009200930094009500}
    ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0f, al=96000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9700980099009a009b009c009d009e00}
    ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9f00a000a100a200a300a400a500a600}
    ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=a7000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»LOCAL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=a800a900aa00ab00ac00ad0000000000}
    ProbeDirEnt {status=0x00, name=»NAMES   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7c, al=ae00af00b000b100b200b300b400b500}
    ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b600b700b800b900ba00bb00bc00bd00}
    ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x32, al=be00bf00c000c1000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c200c300c400c500c600c700c800c900}
    ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=ca000000000000000000000000000000}
*  73 -   0 [1, 2, 3, 4, 5, 6, 7, 8]
+  61 -  12 [1, 4, 7, 2, 5, 8, 3, 6]
+  50 -  10 [1, 3, 5, 7, 2, 4, 6, 8]

Full view