On Fri, Mar 5, 2021 at 4:55 AM Lars Brinkhoff via cctalk < cctalk@classiccmp.org> wrote:
> Hello, > > Someone sent me these magtape images from Tymshare and said "they fell > off the back of a truck on route 62 in Hudson, MASS." I don't know > their provenance. > > Sorry, I don't have any good hosting. For now they are here: > https://gitlab.com/larsbrinkhoff/tymshare > > The download.sh script will retrieve individual files one by one rather > than cloning the repository; next use cat.sh to get the .tape.bz2 files. > > The tape format is close to not not quite FAILSAFE. With help from Joe > Smith, I made a tool to extract the files: > https://github.com/larsbrinkhoff/pdp10-its-disassembler/blob/master/tito.c I'm not having any luck with either back10 or tito. $ sha1sum 169249.tape 1230fb20086990a1ff777fce32591f2900425694 169249.tape (So that's good) $ ./tito -x -f 169249.tape fopen: Is a directory $ bin/back10 -l -f 169249.tape | head 18-Nov-1858 00:00:00 <754> dsk:[1,1][3,700202].ufd 18-Nov-1858 00:00:00 <754> dsk:[1,1][3,700004].ufd 18-Nov-1858 00:00:00 <754> dsk:[1,1][3,700220].ufd $ bin/back10 -x -f 169249.tape ... that gets lots of files with names like 'dsk:[1,4]specdf525].mic' That just seems wrong.