DataMuseum.dk

Presents historical artifacts from the history of:

RegneCentralen RC759 "Piccoline"

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about RegneCentralen RC759 "Piccoline"

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics
Index: 5 B C F G L M N P R S T X

⟦f4f24e427⟧ Bits:30002697 SW1458 Concurrent DOS Distributionsdiskette 4.0 - disk 2/3, 5¼" Floppy Disk, CpmFSAuto

    Length: 1261568 (0x134000)
    Description: Bits:30002697 SW1458 Concurrent DOS Distributionsdiskette 4.0 - disk 2/3
    Types: 5¼" Floppy Disk, CpmFSAuto
    Notes: CP/M-fs(1024_2048_0x0_*1+1_2:0_76:1_128)

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         1024_2048_0x0_*1+1_2:0_76:1_128
Confidence score:  +117/-0 
Sector size:       1024
Block size:        2048
Directory entries: 128
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0023424BDOS.CON⟦502ba11a7⟧
0041984BESKED.CMD⟦3963f17aa⟧
00209664CCPM.SYS⟦be390f6a5⟧
006016CIO.CON⟦cc126d9ca⟧
00640CLOCK.RSP⟦47fd682bf⟧
0021632FILEX.A86⟦c864451fd⟧ TextFile
002688FILEX.CMD⟦ceed655ff⟧
0049536GENCCPM.CMD⟦222ee6c26⟧
00256GENINST.SUB⟦4ec9be81f⟧ TextFile
0039296LANREL.CMD⟦bd5157903⟧
0039680MATREL.CMD⟦e70e8d2d3⟧
0018560MATRELHW.CMD⟦d994f55f8⟧
0019712MATRELSW.CMD⟦21b904476⟧
006144MEM.CON⟦ee4fd466d⟧
001792MINTERN.CMD⟦6f10a2e4e⟧
009088MODEM.CMD⟦7f98d6ad4⟧
001408MODEM.KAT⟦d4b0a6556⟧
0023680NETDRV.RSP⟦fada983a3⟧
00256NETKONF⟦48677865a⟧ TextFile
0051968NETVEDL.CMD⟦0cad93b6e⟧
003200PIN759.RSP⟦65a6ea281⟧
0017280PINTERN.CMD⟦3100e53f9⟧
009344PIP.CMD⟦307e4cf3c⟧
0037888POSTHUS.CMD⟦9e65eb2a4⟧
0032768RCADDNET.CMD⟦e45eff9f8⟧
005120RCDSP.CMD⟦b95b71ff5⟧
0046848RCGENNET.CMD⟦1abce0bc8⟧
001920RCNIOS.CMD⟦1a810ffb0⟧
0016384RCSPL.CMD⟦60f369d2a⟧
0031744RNET.CMD⟦7222caa28⟧
0038528RSNET.CMD⟦f3a2f1b76⟧
007680RTM.CON⟦24a9f75b8⟧
00640SCROLL.RSP⟦f3378549e⟧
0038528SIOREL.CMD⟦bcf4754e5⟧
0020736SNET.CMD⟦b68a23120⟧
0042240SPOOL.CMD⟦159e8616b⟧
00256STDKONF⟦622ecd79f⟧ TextFile
003584SUBMIT.CMD⟦3ece11c64⟧
008960SUP.CON⟦83023b077⟧
003456SYSDAT.CON⟦9090bd8b1⟧
0049024SYSVEDL.CMD⟦c17db3bac⟧
0033152TMP759.RSP⟦34d6db8e1⟧
0041088XIOS.CON⟦4156075d0⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 8]]

First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x8000 25-25-25-22-1-1-1-1
   (2, 1)  0xa000 1-1-1-1-1-1-1-1

Total credibility: 93

Block number width: ok16

   8   363     1   255   207  False
  16     0     8   544     0  False

Block Sizes:
    2048 0x00 +92 -0
    1024 0x00 +8 -84
    4096 0x01 +8 -84
    8192 0x03 +8 -84
   16384 0x07 +8 -84
   32768 0x0f +8 -84
   65536 0x1f +8 -84
     512 0x00 +5 -87
     256 0x00 +3 -89
     128 0x00 +0 -92

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5-6-7-8)                                                         [24, 24, 24, 21]   +117/-0
     26  normal-2     (1-3-5-7-2-4-6-8)                                                         [24, 24, 0, 0, 24, 21]   +95/-19
     51  normal-3     (1-4-7-2-5-8-3-6)                                                         [24, 21, 0, 24, 0, 0, 24]   +100/-19
From the beastiarium: CpmFSCr16   +0/-0
From the beastiarium: CpmFSJames   +0/-0

File & label names found:
  0x0008000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»Rel4-0 D2/3«, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000000d1507000d1507}
    ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=080009000a000b000c000d000e000f00}
    ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x37, al=10001100120013000000000000000000}
    ProbeDirEnt {status=0x00, name=»CIO     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2f, al=14001500160000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MEM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=17001800190000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RTM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=1a001b001c001d000000000000000000}
    ProbeDirEnt {status=0x00, name=»SUP     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x46, al=1e001f00200021002200000000000000}
    ProbeDirEnt {status=0x00, name=»SYSDAT  CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1b, al=23002400000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=250026002700280029002a002b002c00}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2d002e002f0030003100320033003400}
    ProbeDirEnt {status=0x00, name=»XIOS    CON«, xl=0x02, bc=0x00, xh=0x00, rc=0x41, al=35003600370038003900000000000000}
    ProbeDirEnt {status=0x00, name=»CLOCK   RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=3a000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=3b003c003d003e003f00400041004200}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x39, al=43004400450046000000000000000000}
    ProbeDirEnt {status=0x00, name=»PIN759  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=47004800000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TMP759  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=49004a004b004c004d004e004f005000}
    ProbeDirEnt {status=0x00, name=»TMP759  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=51005200530054005500560057005800}
    ProbeDirEnt {status=0x00, name=»TMP759  RSP«, xl=0x02, bc=0x00, xh=0x00, rc=0x03, al=59000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SCROLL  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=5a000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5b005c005d005e005f00600061006200}
    ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=63006400650066006700680069006a00}
    ProbeDirEnt {status=0x00, name=»POSTHUS CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x28, al=6b006c006d0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=6e006f00700071007200730074007500}
    ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=76007700780079007a007b007c007d00}
  0x0008400 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»BESKED  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x48, al=7e007f00800081008200000000000000}
    ProbeDirEnt {status=0x00, name=»MINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=83000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8400850086008700880089008a008b00}
    ProbeDirEnt {status=0x00, name=»PINTERN CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x07, al=8c000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8d008e008f0090009100920093009400}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=950096009700980099009a009b009c00}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x4a, al=9d009e009f00a000a100000000000000}
    ProbeDirEnt {status=0x00, name=»RCDSP   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x28, al=a200a300a40000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCSPL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a500a600a700a800a900aa00ab00ac00}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ad00ae00af00b000b100b200b300b400}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=b500b600b700b800b900ba00bb00bc00}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=bd00be00bf00c000c100c200c300c400}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x16, al=c500c600000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c700c800c900ca00cb00cc00cd00ce00}
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=cf00d000d100d200d300d400d500d600}
    ProbeDirEnt {status=0x00, name=»RCGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x6e, al=d700d800d900da00db00dc00dd000000}
    ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=de00df00e000e100e200e300e400e500}
    ProbeDirEnt {status=0x00, name=»RCADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=e600e700e800e900ea00eb00ec00ed00}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ee00ef00f000f100f200f300f400f500}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=f600f700f800f900fa00fb00fc00fd00}
    ProbeDirEnt {status=0x00, name=»SIOREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2d, al=fe00ff00000100000000000000000000}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=01010201030104010501060107010801}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=09010a010b010c010d010e010f011001}
    ProbeDirEnt {status=0x00, name=»SYSVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x7f, al=11011201130114011501160117011801}
  0x0008800 (2, 0, 3)
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=19011a011b011c011d011e011f012001}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=21012201230124012501260127012801}
    ProbeDirEnt {status=0x00, name=»MATREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x36, al=29012a012b012c010000000000000000}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2d012e012f0130013101320133013401}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=350136013701380139013a013b013c01}
    ProbeDirEnt {status=0x00, name=»LANREL  CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x33, al=3d013e013f0140010000000000000000}
    ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=41014201430144014501460147014801}
    ProbeDirEnt {status=0x00, name=»MATRELHWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=49014a01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4b014c014d014e014f01500151015201}
    ProbeDirEnt {status=0x00, name=»MATRELSWCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=53015401000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MODEM   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x47, al=55015601570158015901000000000000}
    ProbeDirEnt {status=0x00, name=»MODEM   KAT«, xl=0x00, bc=0x00, xh=0x00, rc=0x0b, al=5a010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5b015c015d015e015f01600161016201}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=63016401650166016701680169016a01}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=6b016c016d016e016f01700171017201}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=73017401750176017701780179017a01}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=7b017c017d017e017f01800181018201}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=83018401850186018701880189018a01}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=8b018c018d018e018f01900191019201}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=93019401950196019701980199019a01}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x80, al=9b019c019d019e019f01a001a101a201}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x09, bc=0x00, xh=0x00, rc=0x80, al=a301a401a501a601a701a801a901aa01}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0a, bc=0x00, xh=0x00, rc=0x80, al=ab01ac01ad01ae01af01b001b101b201}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0b, bc=0x00, xh=0x00, rc=0x80, al=b301b401b501b601b701b801b901ba01}
  0x0008c00 (2, 0, 4)
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x0c, bc=0x00, xh=0x00, rc=0x66, al=bb01bc01bd01be01bf01c001c1010000}
    ProbeDirEnt {status=0x00, name=»FILEX   A86«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c201c301c401c501c601c701c801c901}
    ProbeDirEnt {status=0x00, name=»FILEX   A86«, xl=0x01, bc=0x00, xh=0x00, rc=0x29, al=ca01cb01cc0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»FILEX   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x15, al=cd01ce01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»STDKONF    «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=cf010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETKONF    «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=d0010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»GENINST SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=d1010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d201d301d401d501d601d701d801d901}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=da01db01dc01dd01de01df01e001e101}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=e201e301e401e501e601e701e801e901}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x03, al=ea010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PIP     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x49, al=eb01ec01ed01ee01ef01000000000000}
    ProbeDirEnt {status=0x00, name=»RCNIOS  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=f0010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f101f201f301f401f501f601f701f801}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x78, al=f901fa01fb01fc01fd01fe01ff010002}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=01020202030204020502060207020802}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=09020a020b020c020d020e020f021002}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2d, al=11021202130200000000000000000000}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1402150216021702180219021a021b02}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x22, al=1c021d021e0200000000000000000000}
    ProbeDirEnt {status=0x00, name=»SUBMIT  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x1c, al=1f022002000000000000000000000000}
* 117 -   0 [1, 2, 3, 4, 5, 6, 7, 8]
+ 100 -  19 [1, 4, 7, 2, 5, 8, 3, 6]
+  95 -  19 [1, 3, 5, 7, 2, 4, 6, 8]

Full view