DataMuseum.dk

Presents historical artifacts from the history of:

RegneCentralen RC759 "Piccoline"

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about RegneCentralen RC759 "Piccoline"

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics
Index: 5 A B C D G I L M N P R S T V X

⟦57374e1c8⟧ Bits:30002686 SW1400-10 Piccoline Distributions system 2.3 - disk 2/4, Bits:30004538/disk2.imd SW1400-10 Piccoline Distributions system 2.3, 5¼" Floppy Disk, CpmFSAuto, ImdContainer

    Length: 1261568 (0x134000)
    Description: Bits:30004538/disk2.imd SW1400-10 Piccoline Distributions system 2.3
    Description: Bits:30002686 SW1400-10 Piccoline Distributions system 2.3 - disk 2/4
    Types: 5¼" Floppy Disk, CpmFSAuto, ImdContainer
    Notes: CP/M-fs(1024_2048_0x0_*1+1_2:0_76:1_128)

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         1024_2048_0x0_*1+1_2:0_76:1_128
Confidence score:  +117/-0 
Sector size:       1024
Block size:        2048
Directory entries: 128
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0 0 12544 ADDNET.CMD ⟦5b727c266⟧
0 0 15744 BDOS.CON ⟦535d34f2b⟧
0 0 123136 CCPM.SYS ⟦5fca4f039⟧
0 0 95104 CCPM1.SYS ⟦7592820e8⟧
0 0 104704 CCPM4.SYS ⟦8743fd40e⟧
0 0 5504 CIO.CON ⟦75c8e9dde⟧
0 0 640 CLOCK.RSP ⟦9b24ff61d⟧
0 0 24192 CPADDNET.CMD ⟦2230ef36d⟧
0 0 41344 CPGENNET.CMD ⟦32cb584f7⟧
0 0 29312 DRNET.CMD ⟦9435652d1⟧
0 0 12800 DSP.CMD ⟦acf6871d9⟧
0 0 52608 GENCCPM.CMD ⟦d1549c14d⟧
0 0 12544 GENNET.CMD ⟦cb9d43b50⟧
0 0 11392 LOCAL.CMD ⟦df81e6a32⟧
0 0 16512 LOGOFF.CMD ⟦054f6893e⟧
0 0 18432 LOGON.CMD ⟦4eccef5fe⟧
0 0 6144 MEM.CON ⟦aa42f5e9f⟧
0 0 16000 NAMES.CMD ⟦003bd88d2⟧
0 0 22912 NAMESMOD.CMD ⟦ea69a1aa9⟧
0 0 17536 NET.CMD ⟦4f982e6be⟧
0 0 17664 NETDRV.RSP ⟦6de4aef19⟧
0 0 22784 NETDRVB.RSP ⟦8077c95d5⟧
0 0 16384 NETOFF.CMD ⟦8243b6545⟧
0 0 16384 NETON.CMD ⟦73b901ebb⟧
0 0 17920 NETSTAT.CMD ⟦c67d05638⟧
0 0 38272 NETVEDL.CMD ⟦099ebc038⟧
0 0 1792 NIOS.CMD ⟦ff28041a4⟧
0 0 1792 NIOS1.CMD ⟦ea6840b62⟧
0 0 3328 PIN.RSP ⟦65c9cbd7d⟧
0 0 1152 R.CMD ⟦fda426646⟧
0 0 128 RDEF1 ⟦6ffaa521c⟧ TextFile
0 0 128 RDEF4 ⟦49338253a⟧ TextFile
0 0 27264 RNET.CMD ⟦61aa2ab88⟧
0 0 128 RSDEF1 ⟦304ce49ff⟧ TextFile
0 0 128 RSDEF4 ⟦7f3f51e99⟧ TextFile
0 0 33408 RSNET.CMD ⟦b95abc5eb⟧
0 0 7552 RTM.CON ⟦9c2ee7491⟧
0 0 640 SCROLL.RSP ⟦a29593a77⟧
0 0 128 SDEF ⟦4eb454ef9⟧ TextFile
0 0 19712 SNET.CMD ⟦0f588d411⟧
0 0 21120 SPL.CMD ⟦ffcd99468⟧
0 0 33664 SPOOL.CMD ⟦0eeb85111⟧
0 0 256 STDKONF ⟦5ddf5f22d⟧ TextFile
0 0 5632 SUP.CON ⟦d9b79db5d⟧
0 0 3328 SYSDAT.CON ⟦13f8b41e3⟧
0 0 7168 TMP759.RSP ⟦87ee6d2ba⟧
0 0 2944 VOUT.RSP ⟦f665ed891⟧
0 0 25728 XIOS1.CON ⟦6e52c1cac⟧
0 0 29440 XIOS4.CON ⟦7ac3a6b99⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 8]]

First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x8000 25-25-25-22-1-1-1-1
   (2, 1)  0xa000 1-1-1-1-1-1-1-1

Total credibility: 93

Block number width: ok16

   8   296     1   255   216  False
  16     0     8   519     0  False

Block Sizes:
    2048 0x00 +92 -0
    1024 0x00 +11 -81
    4096 0x01 +11 -81
    8192 0x03 +11 -81
   16384 0x07 +11 -81
   32768 0x0f +11 -81
   65536 0x1f +11 -81
     256 0x00 +7 -85
     512 0x00 +7 -85
     128 0x00 +6 -86

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5-6-7-8)                                                         [24, 24, 24, 21]   +117/-0
     26  normal-2     (1-3-5-7-2-4-6-8)                                                         [24, 24, 0, 0, 24, 21]   +99/-21
     51  normal-3     (1-4-7-2-5-8-3-6)                                                         [24, 21, 0, 24, 0, 0, 24]   +105/-18
From the beastiarium: CpmFSCr16   +0/-0

File & label names found:
  0x0008000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»PIC 2-3.2-3«, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000520a1106520a1106}
    ProbeDirEnt {status=0x00, name=»ADDNET  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=080009000a000b000c000d000e000000}
    ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x7b, al=0f001000110012001300140015001600}
    ProbeDirEnt {status=0x00, name=»CIO     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=17001800190000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CLOCK   RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=1a000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1b001c001d001e001f00200021002200}
    ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x3d, al=23002400250026000000000000000000}
    ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2700280029002a002b002c002d002e00}
    ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2f003000310032003300340035003600}
    ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x43, al=3700380039003a003b00000000000000}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=3c003d003e003f004000410042004300}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=4400450046004700480049004a004b00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=4c004d004e004f005000510052005300}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=5400550056005700580059005a005b00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=5c005d005e005f006000610062006300}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=6400650066006700680069006a006b00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=6c006d006e006f007000710072007300}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x42, al=74007500760077007800000000000000}
    ProbeDirEnt {status=0x00, name=»XIOS4   CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=79007a007b007c007d007e007f008000}
    ProbeDirEnt {status=0x00, name=»XIOS4   CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x66, al=81008200830084008500860087000000}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=880089008a008b008c008d008e008f00}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=90009100920093009400950096009700}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=980099009a009b009c009d009e009f00}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=a000a100a200a300a400a500a600a700}
  0x0008400 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=a800a900aa00ab00ac00ad00ae00af00}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x67, al=b000b100b200b300b400b500b6000000}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b700b800b900ba00bb00bc00bd00be00}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=bf00c000c100c200c300c400c500c600}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=c700c800c900ca00cb00cc00cd00ce00}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=cf00d000d100d200d300d400d500d600}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=d700d800d900da00db00dc00dd00de00}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=df00e000e100e200e300e400e500e600}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x32, al=e700e800e900ea000000000000000000}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=eb00ec00ed00ee00ef00f000f100f200}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f300f400f500f600f700f800f900fa00}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=fb00fc00fd00fe00ff00000101010201}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x1b, al=03010401000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»GENNET  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=050106010701080109010a010b010000}
    ProbeDirEnt {status=0x00, name=»MEM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=0c010d010e0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0f011001110112011301140115011601}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x0a, al=17010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DRNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=180119011a011b011c011d011e011f01}
    ProbeDirEnt {status=0x00, name=»DRNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x65, al=20012101220123012401250126010000}
    ProbeDirEnt {status=0x00, name=»PIN     RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=27012801000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»R       CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=29010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2a012b012c012d012e012f0130013101}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x55, al=32013301340135013601370100000000}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=380139013a013b013c013d013e013f01}
  0x0008800 (2, 0, 3)
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=40014101420143014401450146014701}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x05, al=48010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TMP759  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x38, al=49014a014b014c010000000000000000}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4d014e014f0150015101520153015401}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=550156015701580159015a015b015c01}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2b, al=5d015e015f0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=60016101620163016401650166016701}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=68016901000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SUP     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=6a016b016c0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»SYSDAT  CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=6d016e01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»VOUT    RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x17, al=6f017001000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RTM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=71017201730174010000000000000000}
    ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=750176017701780179017a017b017c01}
    ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x01, al=7d010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NAMES   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7d, al=7e017f01800181018201830184018501}
    ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=86018701880189018a018b018c018d01}
    ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=8e010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8f019001910192019301940195019601}
    ProbeDirEnt {status=0x00, name=»SPL     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9701980199019a019b019c019d019e01}
    ProbeDirEnt {status=0x00, name=»SPL     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x25, al=9f01a001a10100000000000000000000}
    ProbeDirEnt {status=0x00, name=»LOCAL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=a201a301a401a501a601a70100000000}
    ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a801a901aa01ab01ac01ad01ae01af01}
    ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=b0010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b101b201b301b401b501b601b701b801}
  0x0008c00 (2, 0, 4)
    ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x33, al=b901ba01bb01bc010000000000000000}
    ProbeDirEnt {status=0x00, name=»NETOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=bd01be01bf01c001c101c201c301c401}
    ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c501c601c701c801c901ca01cb01cc01}
    ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=cd010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ce01cf01d001d101d201d301d401d501}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=d601d701d801d901da01db01dc01dd01}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x07, al=de010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NIOS    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=df010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DSP     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x64, al=e001e101e201e301e401e501e6010000}
    ProbeDirEnt {status=0x00, name=»SDEF       «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=e7010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RDEF4      «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=e8010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RDEF1      «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=e9010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RSDEF4     «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=ea010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RSDEF1     «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=eb010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»STDKONF    «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=ec010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SCROLL  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=ed010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ee01ef01f001f101f201f301f401f501}
    ProbeDirEnt {status=0x00, name=»NETDRVB RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x32, al=f601f701f801f9010000000000000000}
    ProbeDirEnt {status=0x00, name=»NIOS1   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=fa010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»XIOS1   CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=fb01fc01fd01fe01ff01000201020202}
    ProbeDirEnt {status=0x00, name=»XIOS1   CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x49, al=03020402050206020702000000000000}
* 117 -   0 [1, 2, 3, 4, 5, 6, 7, 8]
+ 105 -  18 [1, 4, 7, 2, 5, 8, 3, 6]
+  99 -  21 [1, 3, 5, 7, 2, 4, 6, 8]

Full view