Helping Preserve Our Digital History
Generated: 2026-03-09 11:11:07

▸ Disk Identity

Image Size160 KB
FilesystemFAT12 (assumed — non-standard BPB)
Floppy Type160KB
Form Factor5.25"
Format NotesIBM DOS 1.0 SS/SD
Cylinders40
Heads1
Sectors/Track8
Total Sectors320

▸ Contents Summary

12FILES
0DIRECTORIES
63.6 KBTOTAL DATA
Used capacity39.7%
Slack space60.3% (96.4 KB)
Date range1980-01-01 → 1985-05-17
Largest fileMARKET.BAS (12.2 KB)
Cross-disk dupes0 file(s)
AV status✓ CLEAN
Disk SHA-256:e1de1d827895632be5b0ebbf7a1448d1a05fb207bde2fdb302bdae5051592a5f

▸ Archivist's Notes

No archivists's notes currently available for this disk.

▸ Directory Tree

┌─ ODRVOL1.IMG
│
├── BOOLEAN.BAS                5.7 KB  1985-02-14  sha256:be39e020803b5e62adad5fec6236da612fffc5fb4ea4f1ff478cc2a652d5934d
├── KINGDOM.BAS                5.1 KB  1985-02-06  sha256:ab65e9101062c611a9000e2e64f51074432e9d327d57a3b2725f6ce7b79fb456
├── MYSTERY.BAS                5.3 KB  1985-02-06  sha256:9898952cc6adf5413ac7c777c05fdc95b6fa2378042dd0e2cb73379d31260beb
├── SAVING.BAS                 3.7 KB  1985-02-06  sha256:4bf088036c7f3822d9af94767733d929b3312bf0137875c4d3591dca57e0b558
├── MISSILE.BAS                2.7 KB  1985-02-14  sha256:1d67914f29fb8fe89bd14fd9f51c1700a88d3762d9dcbf1bfa34fcc6dcf1104b
├── TOWER.BAS                  2.1 KB  1985-02-14  sha256:5e13c30c4ebcf6c7d8969d7a03cca9ce459969f2acdd7bd61ddc309ec1228004
├── MARKET.BAS                12.2 KB  1985-05-17  sha256:58228a9b4bb67832075b72c94f0c4de6a428096036fcfaafedd71f07d49eb8f9
├── ELECSEC.BAS                6.2 KB  1985-02-06  sha256:77a7355a1c3d182d12231c746884cac5ccd9757564f07a05edc946c076997f11
├── TABLUT.BAS                 4.9 KB  1985-02-14  sha256:e95dd5199ece6444b1b99705aa744d0b12d83b41dc521a5a17dc2270b0de6568
├── CALC.BAS                   9.2 KB  1985-02-06  sha256:567f51c283e69872b6c4a6c8b211c8b4e52fd9a0fbe3129965d764ad38364d09
├── TRIPCOST.HCL                961 B  1980-01-01  sha256:e88c112ac098afe7011f479fac2a2acd5906a436d7ae279be8370f07170b6aac
└── SEATTLE.HCD                5.6 KB  1980-01-01  sha256:c17e205c579d1860a660aa4d880cce4d8ece2a873631147e6e0e0b5b36ef2b6a
│
└─ END ODRVOL1.IMG

▸ File Manifest

PathSize ModifiedSHA-256
BOOLEAN.BAS 5.7 KB 1985-02-14 15:53 be39e020803b5e62adad5fec6236da612fffc5fb4ea4f1ff478cc2a652d5934d
KINGDOM.BAS 5.1 KB 1985-02-06 13:25 ab65e9101062c611a9000e2e64f51074432e9d327d57a3b2725f6ce7b79fb456
MYSTERY.BAS 5.3 KB 1985-02-06 13:37 9898952cc6adf5413ac7c777c05fdc95b6fa2378042dd0e2cb73379d31260beb
SAVING.BAS 3.7 KB 1985-02-06 13:36 4bf088036c7f3822d9af94767733d929b3312bf0137875c4d3591dca57e0b558
MISSILE.BAS 2.7 KB 1985-02-14 13:43 1d67914f29fb8fe89bd14fd9f51c1700a88d3762d9dcbf1bfa34fcc6dcf1104b
TOWER.BAS 2.1 KB 1985-02-14 11:09 5e13c30c4ebcf6c7d8969d7a03cca9ce459969f2acdd7bd61ddc309ec1228004
MARKET.BAS 12.2 KB 1985-05-17 16:02 58228a9b4bb67832075b72c94f0c4de6a428096036fcfaafedd71f07d49eb8f9
ELECSEC.BAS 6.2 KB 1985-02-06 14:50 77a7355a1c3d182d12231c746884cac5ccd9757564f07a05edc946c076997f11
TABLUT.BAS 4.9 KB 1985-02-14 11:30 e95dd5199ece6444b1b99705aa744d0b12d83b41dc521a5a17dc2270b0de6568
CALC.BAS 9.2 KB 1985-02-06 15:01 567f51c283e69872b6c4a6c8b211c8b4e52fd9a0fbe3129965d764ad38364d09
TRIPCOST.HCL 961 B 1980-01-01 00:21 e88c112ac098afe7011f479fac2a2acd5906a436d7ae279be8370f07170b6aac
SEATTLE.HCD 5.6 KB 1980-01-01 00:36 c17e205c579d1860a660aa4d880cce4d8ece2a873631147e6e0e0b5b36ef2b6a

▸ Antivirus Scan

✓ NO THREATS DETECTED
12FILES SCANNED
0INFECTED
0ERRORS
0sSCAN TIME
Engine: ClamAV 1.4.3 / DB 27949  ·  via clamdscan
Infected files: 0
Time: 0.000 sec (0 m 0 s)

▸ Archive.org

This disk image has not yet been submitted to the Internet Archive.
Once uploaded, create ODRVol1.link in the archive directory containing the item identifier.

▸ Live Access via mTCP NetDrive

This disk image is available for immediate live access on the public X86.WORLD mTCP NetDrive service. Mount it directly as a drive letter on any DOS machine with a network connection — no download required.

DOS COMMAND
NETDRIVE CONNECT disks.x86.world:2002 ODRVol1.img D:

Requires mTCP and a configured packet driver. Replace D: with any free drive letter. The connection is session-scoped (writeable, but only for your connected session).
Type NETDRIVE DISCONNECT D: to unmount.